Integrated Professional Skills in the Digital Age: ICT Impact Report
VerifiedAdded on 2022/07/26
|14
|4494
|17
Report
AI Summary
This report, focusing on Integrated Professional Skills in the Digital Age, investigates the pervasive impact of Information and Communication Technology (ICT) on businesses. It begins by defining ICT and its role, followed by a literature review of key concepts such as collaboration tools, cloud storage, and cloud computing, alongside discussions on privacy and security. The analysis delves into the application of collaboration tools, the importance of privacy and security during the pandemic, and the impact of the cryptocurrency crash. The report highlights the significant economic influence of ICT, particularly in the context of the COVID-19 pandemic, emphasizing the adoption of digital technologies for business resilience. It examines various collaboration tools, cloud storage solutions, and cloud computing models, discussing their advantages and disadvantages, including security concerns and cost management. The report concludes by summarizing the key findings and providing references to support the analysis.

Integrated Professional Skills in Digital Age
Course/Programme: BA (Hons) Business Studies with Foundation
Level:
Foundation Year 0 (Level 0)
Year 2 Level 4
Year 3 Level 5
Year 4 Level 6
Foundation Year 0 (Level 0)
Module Title: Integrated Professional Skills in Digital Age
Course/Programme: BA (Hons) Business Studies with Foundation
Level:
Foundation Year 0 (Level 0)
Year 2 Level 4
Year 3 Level 5
Year 4 Level 6
Foundation Year 0 (Level 0)
Module Title: Integrated Professional Skills in Digital Age
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
A wide range of technologies and services are included in the umbrella phrase "Information
and communication technology," which encompasses everything from computers to the
internet. All of these technologies have something to do with transmitting and receiving
information. All parts of our lives have been transformed by the proliferation of information
and communication technology (ICT). In addition to its widespread use, ICT has a significant
economic impact. Because of the widespread use of digital technologies by businesses of all
sizes, companies are now operating in an entirely new manner. As a result of the COVID-19
pandemic in 2020, several businesses had to increase or completely move to digital
technologies to continue their operations. Due to these unusual circumstances, the potential
for digital technology to improve firm economic resilience has been highlighted more than
ever before. Information technology sales are expected to hit $5.5 trillion this year, according
to a study conducted by the consulting firm IDC (2022). Information and communication
technology (ICT) has enormous value and promise, both of which are indescribable in words.
We have witnessed the potential of ICT applications in enterprises and in all other sectors
since COVID-19. There are cyber hazards and so on in the virtual world as well. IT
behemoths are hard at work enhancing ICT safety. There are so many problems that can be
solved by digitalization and the right use of ICT. The numerous applications of ICT in
business are the focus of this report. Collaboration tools in ICT and Internet and IT security,
as well as post-pandemic effects of ICT, are also crucial.
Contents
1.0 Introduction..........................................................................................................................4
A wide range of technologies and services are included in the umbrella phrase "Information
and communication technology," which encompasses everything from computers to the
internet. All of these technologies have something to do with transmitting and receiving
information. All parts of our lives have been transformed by the proliferation of information
and communication technology (ICT). In addition to its widespread use, ICT has a significant
economic impact. Because of the widespread use of digital technologies by businesses of all
sizes, companies are now operating in an entirely new manner. As a result of the COVID-19
pandemic in 2020, several businesses had to increase or completely move to digital
technologies to continue their operations. Due to these unusual circumstances, the potential
for digital technology to improve firm economic resilience has been highlighted more than
ever before. Information technology sales are expected to hit $5.5 trillion this year, according
to a study conducted by the consulting firm IDC (2022). Information and communication
technology (ICT) has enormous value and promise, both of which are indescribable in words.
We have witnessed the potential of ICT applications in enterprises and in all other sectors
since COVID-19. There are cyber hazards and so on in the virtual world as well. IT
behemoths are hard at work enhancing ICT safety. There are so many problems that can be
solved by digitalization and the right use of ICT. The numerous applications of ICT in
business are the focus of this report. Collaboration tools in ICT and Internet and IT security,
as well as post-pandemic effects of ICT, are also crucial.
Contents
1.0 Introduction..........................................................................................................................4

1.1 What is ICT?....................................................................................................................4
1.2 Role of ICT......................................................................................................................4
2.0 Literature review..................................................................................................................5
2.1 Collaboration tools...........................................................................................................5
2.2 Cloud Storage...................................................................................................................5
2.3 Cloud Computing.............................................................................................................6
2.4 Privacy and Security........................................................................................................9
3.0 Analysis and Discussion....................................................................................................10
3.1 Collaboration Tools........................................................................................................10
3.2 Privacy and Security during pandemic..........................................................................10
3.3 Cryptocurrency Crash....................................................................................................12
4.0 Conclusion..........................................................................................................................12
5.0 References..........................................................................................................................13
1.2 Role of ICT......................................................................................................................4
2.0 Literature review..................................................................................................................5
2.1 Collaboration tools...........................................................................................................5
2.2 Cloud Storage...................................................................................................................5
2.3 Cloud Computing.............................................................................................................6
2.4 Privacy and Security........................................................................................................9
3.0 Analysis and Discussion....................................................................................................10
3.1 Collaboration Tools........................................................................................................10
3.2 Privacy and Security during pandemic..........................................................................10
3.3 Cryptocurrency Crash....................................................................................................12
4.0 Conclusion..........................................................................................................................12
5.0 References..........................................................................................................................13
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

1.0 Introduction
1.1 What is ICT?
ICT enables modern computing with its infrastructure and components. ICT refers to any
devices, networking components, programmes, and systems that allow corporations, non-
profits, governments, and criminal enterprises to connect in the digital world. Information
and communication technologies (ICT) are used to transmit, store, produce, share, and
exchange information. These technological tools and resources include computers, the
Internet (websites, blogs, and emails), live broadcasting (radio, television, and webcasting),
recorded broadcasting (podcasting, audio and video players, and storage devices), and
telephony (fixed or mobile, satellite, vision/video-conferencing, etc.) (Brown, 2020).
1.2 Role of ICT
The world has seen the tremendous role of ICT in almost every sector including health,
education, business, governmental organisation and so on. The proper use of ICT helped us to
stand against the recent COVID-19 pandemic. We can see the importance of the use of ICT
in ever sector now. In businesses the use of IT is much known from the last decade. There are
a number of ways in which information and communication technology (ICT) might improve
public health. ICT allows healthcare workers to stay up with the developing in their field,
regardless of where they are located. The rise in employment and productivity, as well as
improved living standards, can be attributed in large part to advances in information and
communication technology (ICT). Proper use of ICT has helped so many big and small
businesses to stay on the line during pandemic situation. The digitalization process in
marketing and sales through online marketing and marketplace helped the businesses to run
their operation online. This is how ICT helped the businesses to grow and gain profit online.
The buyer and the seller both get benefits from the use of information and communication
technology (Lewis D., 2012).
The purpose of this report is to discuss and identify about some key factors of ICT and the
impact of it after global corona pandemic in global businesses. This report will also show the
analyses and discussion of the use of some collaboration tools in ICT, privacy and security
terms during corona pandemic and also discuss on the crypto currency crash.
1.1 What is ICT?
ICT enables modern computing with its infrastructure and components. ICT refers to any
devices, networking components, programmes, and systems that allow corporations, non-
profits, governments, and criminal enterprises to connect in the digital world. Information
and communication technologies (ICT) are used to transmit, store, produce, share, and
exchange information. These technological tools and resources include computers, the
Internet (websites, blogs, and emails), live broadcasting (radio, television, and webcasting),
recorded broadcasting (podcasting, audio and video players, and storage devices), and
telephony (fixed or mobile, satellite, vision/video-conferencing, etc.) (Brown, 2020).
1.2 Role of ICT
The world has seen the tremendous role of ICT in almost every sector including health,
education, business, governmental organisation and so on. The proper use of ICT helped us to
stand against the recent COVID-19 pandemic. We can see the importance of the use of ICT
in ever sector now. In businesses the use of IT is much known from the last decade. There are
a number of ways in which information and communication technology (ICT) might improve
public health. ICT allows healthcare workers to stay up with the developing in their field,
regardless of where they are located. The rise in employment and productivity, as well as
improved living standards, can be attributed in large part to advances in information and
communication technology (ICT). Proper use of ICT has helped so many big and small
businesses to stay on the line during pandemic situation. The digitalization process in
marketing and sales through online marketing and marketplace helped the businesses to run
their operation online. This is how ICT helped the businesses to grow and gain profit online.
The buyer and the seller both get benefits from the use of information and communication
technology (Lewis D., 2012).
The purpose of this report is to discuss and identify about some key factors of ICT and the
impact of it after global corona pandemic in global businesses. This report will also show the
analyses and discussion of the use of some collaboration tools in ICT, privacy and security
terms during corona pandemic and also discuss on the crypto currency crash.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2.0 Literature review
2.1 Collaboration tools
The term "Collaboration" refers to the practise of working together with another person or
group in order to accomplish a goal. An effective collaboration tool is one that aids
individuals in working together toward a single goal or aim. A simple whiteboard in a
conference room can serve as a simple collaborative tool for creativity and problem solving.
A conference call is another way to bring people together to discuss a problem over the
phone. Online collaboration tools are apps, software programmes, or platforms that allow
organisations and their employees expedite the creative process, and work together more
successfully, and more efficiently, online. Microsoft Teams, Google Hangouts, Fuze, Lifesize
Video Conferencing, and Skype are all examples of collaboration tools that help with
business communication. Trello, Airtable, Asana, Basecamp, Wrike, etc. are all examples of
collaboration tools that focus on project and task management (Anon., 2022). Collaboration
tools can be used for communication, team work, project management, task management,
resource management, and creative works and so on. Digital communication has become a
vital tool for businesses of all sizes as they have grown and become more spread out. Cloud
collaboration is when people work on tasks at the same time in a digital space.
Communication is an important part of working together well, but the goal of cloud-based
collaboration is to go beyond just talking. No matter where you are or how far away you are,
cloud collaboration lets you share files, annotate and edit documents in real time, and
streamline workflows (Davidekova, 2022).
2.2 Cloud Storage
Cloud storage transmits and stores data on remote storage systems, where it's managed,
backed up, and made available to users across a network, often the internet. Per-usage,
monthly fees are typical for cloud data storage. Cloud storage features accessible interfaces,
near-instant elasticity and scalability, multi-tenancy, and metered resources. Cloud-based data
is kept in logical pools across commodity storage systems on premises or in a data centre
operated by a cloud provider. There are hybrid cloud, public cloud and private cloud systems.
Compared to traditional data storage methods, such as on premise servers and portable hard
drives, cloud storage is a more cost-effective option for businesses. The capacity to grow the
2.1 Collaboration tools
The term "Collaboration" refers to the practise of working together with another person or
group in order to accomplish a goal. An effective collaboration tool is one that aids
individuals in working together toward a single goal or aim. A simple whiteboard in a
conference room can serve as a simple collaborative tool for creativity and problem solving.
A conference call is another way to bring people together to discuss a problem over the
phone. Online collaboration tools are apps, software programmes, or platforms that allow
organisations and their employees expedite the creative process, and work together more
successfully, and more efficiently, online. Microsoft Teams, Google Hangouts, Fuze, Lifesize
Video Conferencing, and Skype are all examples of collaboration tools that help with
business communication. Trello, Airtable, Asana, Basecamp, Wrike, etc. are all examples of
collaboration tools that focus on project and task management (Anon., 2022). Collaboration
tools can be used for communication, team work, project management, task management,
resource management, and creative works and so on. Digital communication has become a
vital tool for businesses of all sizes as they have grown and become more spread out. Cloud
collaboration is when people work on tasks at the same time in a digital space.
Communication is an important part of working together well, but the goal of cloud-based
collaboration is to go beyond just talking. No matter where you are or how far away you are,
cloud collaboration lets you share files, annotate and edit documents in real time, and
streamline workflows (Davidekova, 2022).
2.2 Cloud Storage
Cloud storage transmits and stores data on remote storage systems, where it's managed,
backed up, and made available to users across a network, often the internet. Per-usage,
monthly fees are typical for cloud data storage. Cloud storage features accessible interfaces,
near-instant elasticity and scalability, multi-tenancy, and metered resources. Cloud-based data
is kept in logical pools across commodity storage systems on premises or in a data centre
operated by a cloud provider. There are hybrid cloud, public cloud and private cloud systems.
Compared to traditional data storage methods, such as on premise servers and portable hard
drives, cloud storage is a more cost-effective option for businesses. The capacity to grow the

service to meet your changing needs is another important benefit of cloud storage options.
Many companies may want to begin with a small amount of data storage and then scale up as
their needs expand. In addition to variables like the number of employees and the size of the
firm premises, data storage must be expandable. An organization's ability to adapt will
skyrocket as a result (Chai, 2022).
As businesses adjust to Covid-19 business needs, one constant remains: The cloud is a game-
changer. Before the epidemic, 88% of enterprises used the cloud and expected to use it more
in 2020. These firms were better prepared to move to a 100% remote workforce when
lockdown and stay-at-home orders were issued in March and April. The pandemic showed
non-cloud-first enterprises that the cloud is a need in the new IT world, not an option. This
realisation, combined with the industry's pandemic experiences, has transformed business
needs and intuition as we navigate the post-Covid-19 scenario. Amazon Web Services,
Google, and Microsoft Azure lead the cloud-based storage industry, although traditional
storage suppliers like Dell EMC, Hewlett Packard Enterprise, Hitachi Data Systems, IBM,
and NetApp also play in the field with products for enterprise and small business owners.
Box and Dropbox offer B2C and B2B cloud storage services. Cloud storage has many
advantages over traditional hardware. Businesses may maximise their storage solution by
knowing cloud storage technology (Brenton, 2020).
2.3 Cloud Computing
The Internet is used to deliver a variety of services in the cloud computing model. Data
storage, servers, databases, networking, and software are among the tools and applications
included in these resources. This means that files can be stored in a distant database rather
than on a local hard disc or storage device. Data and software programmes can be accessed
by any electronic device with an internet connection. Numerous advantages make cloud
computing a popular choice for individuals and enterprises, including the ability to reduce
costs while simultaneously boosting output. It is possible to have a cloud that is both private
and public. It is possible for anyone with an internet connection to purchase services from a
public cloud. A private cloud is a network or data centre that only provides hosted services to
a small group of individuals, with strict controls on who has access to the network and what
they may do with the network's resources. Cloud computing, whether private or public, aims
to make computer resources and IT services easily accessible and scalable. The hardware and
software components needed to implement a cloud computing architecture properly make up
cloud infrastructure.
Many companies may want to begin with a small amount of data storage and then scale up as
their needs expand. In addition to variables like the number of employees and the size of the
firm premises, data storage must be expandable. An organization's ability to adapt will
skyrocket as a result (Chai, 2022).
As businesses adjust to Covid-19 business needs, one constant remains: The cloud is a game-
changer. Before the epidemic, 88% of enterprises used the cloud and expected to use it more
in 2020. These firms were better prepared to move to a 100% remote workforce when
lockdown and stay-at-home orders were issued in March and April. The pandemic showed
non-cloud-first enterprises that the cloud is a need in the new IT world, not an option. This
realisation, combined with the industry's pandemic experiences, has transformed business
needs and intuition as we navigate the post-Covid-19 scenario. Amazon Web Services,
Google, and Microsoft Azure lead the cloud-based storage industry, although traditional
storage suppliers like Dell EMC, Hewlett Packard Enterprise, Hitachi Data Systems, IBM,
and NetApp also play in the field with products for enterprise and small business owners.
Box and Dropbox offer B2C and B2B cloud storage services. Cloud storage has many
advantages over traditional hardware. Businesses may maximise their storage solution by
knowing cloud storage technology (Brenton, 2020).
2.3 Cloud Computing
The Internet is used to deliver a variety of services in the cloud computing model. Data
storage, servers, databases, networking, and software are among the tools and applications
included in these resources. This means that files can be stored in a distant database rather
than on a local hard disc or storage device. Data and software programmes can be accessed
by any electronic device with an internet connection. Numerous advantages make cloud
computing a popular choice for individuals and enterprises, including the ability to reduce
costs while simultaneously boosting output. It is possible to have a cloud that is both private
and public. It is possible for anyone with an internet connection to purchase services from a
public cloud. A private cloud is a network or data centre that only provides hosted services to
a small group of individuals, with strict controls on who has access to the network and what
they may do with the network's resources. Cloud computing, whether private or public, aims
to make computer resources and IT services easily accessible and scalable. The hardware and
software components needed to implement a cloud computing architecture properly make up
cloud infrastructure.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Today's cloud computing system exhibits a wide range of characteristics that have offered
considerable benefits to enterprises of all sizes over the past few decades. The following are
some of the most important properties of cloud computing:
Provider-assisted setup.
On-demand computing resources are available to end users for a wide range of applications.
The provisioning and management of computing resources by IT managers is no longer
necessary because end users can set up computing resources like server time and network
storage on their own.
Elasticity.
In times of rising computing demand, companies have the option of expanding or contracting
their infrastructure at will. This reduces the need for significant investments in local
infrastructure, which may or may not be operational at any given moment.
Reimbursement is based on the number of times a user’s can pay solely for the resources
and workloads they consume, as compute resources are assessed at a granular level.
Resilience to the demands of the job.
It is not uncommon for CSPs to make advantage of redundant resources in order to provide
reliable storage and to maintain critical workloads for their customers around the world.
Adaptability in terms of relocation.
In order to save money or take advantage of newer services, organisations can migrate some
of their workloads to or from the cloud, either manually or automatically.
Access to a large network.
Cloud data can be accessed or uploaded from any device with an internet connection.
Resource sharing and multi-tenancy in the same application. Customers can share the same
physical infrastructures or applications with multi-tenancy while yet maintaining their own
privacy and security. Cloud providers can use the same physical resources to serve a large
considerable benefits to enterprises of all sizes over the past few decades. The following are
some of the most important properties of cloud computing:
Provider-assisted setup.
On-demand computing resources are available to end users for a wide range of applications.
The provisioning and management of computing resources by IT managers is no longer
necessary because end users can set up computing resources like server time and network
storage on their own.
Elasticity.
In times of rising computing demand, companies have the option of expanding or contracting
their infrastructure at will. This reduces the need for significant investments in local
infrastructure, which may or may not be operational at any given moment.
Reimbursement is based on the number of times a user’s can pay solely for the resources
and workloads they consume, as compute resources are assessed at a granular level.
Resilience to the demands of the job.
It is not uncommon for CSPs to make advantage of redundant resources in order to provide
reliable storage and to maintain critical workloads for their customers around the world.
Adaptability in terms of relocation.
In order to save money or take advantage of newer services, organisations can migrate some
of their workloads to or from the cloud, either manually or automatically.
Access to a large network.
Cloud data can be accessed or uploaded from any device with an internet connection.
Resource sharing and multi-tenancy in the same application. Customers can share the same
physical infrastructures or applications with multi-tenancy while yet maintaining their own
privacy and security. Cloud providers can use the same physical resources to serve a large
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

number of customers thanks to resource sharing. To meet the needs of various customers,
cloud service providers should have wide and flexible resource pools.
Cloud computing disadvantages
Despite the benefits of cloud computing, IT personnel face hurdles.
Could Security
Cloud computing's biggest challenge is security. Cloud-based enterprises risk data breaches,
API hacking, compromised passwords, and authentication difficulties. Lack of openness
exists around how and where cloud providers handle sensitive data. Cloud setups, company
strategy, and practise require security.
Inconsistent costs. Pay-as-you-go cloud subscription plans and scaling resources to meet
shifting workload demands can make final costs hard to define. One cloud service commonly
uses other cloud services, which all appear on the monthly payment. Unplanned cloud costs
can result.
Incompetence. Companies are trying to keep up with the need for tools and workers with the
right skill sets and knowledge to plan, implement, and manage cloud workloads and data.
Managing IT. Do-it-yourself cloud computing makes IT governance difficult because
provisioning, provisioning, and infrastructure management are uncontrolled. This can make
risk management, IT compliance, and data quality difficult.
Industry regulations. When migrating data from on-premises local storage to the cloud,
third-party compliance can be tricky. To manage regulatory compliance and business
governance, know where data and workloads are housed.
Multi-cloud management. Multi-cloud installations can disjoin efforts to overcome cloud
computing difficulties.
Cloud functionality. Performance, such as latency, is mainly out of the organization's
control. Network and provider disruptions might impair corporate activities if companies
aren't prepared.
cloud service providers should have wide and flexible resource pools.
Cloud computing disadvantages
Despite the benefits of cloud computing, IT personnel face hurdles.
Could Security
Cloud computing's biggest challenge is security. Cloud-based enterprises risk data breaches,
API hacking, compromised passwords, and authentication difficulties. Lack of openness
exists around how and where cloud providers handle sensitive data. Cloud setups, company
strategy, and practise require security.
Inconsistent costs. Pay-as-you-go cloud subscription plans and scaling resources to meet
shifting workload demands can make final costs hard to define. One cloud service commonly
uses other cloud services, which all appear on the monthly payment. Unplanned cloud costs
can result.
Incompetence. Companies are trying to keep up with the need for tools and workers with the
right skill sets and knowledge to plan, implement, and manage cloud workloads and data.
Managing IT. Do-it-yourself cloud computing makes IT governance difficult because
provisioning, provisioning, and infrastructure management are uncontrolled. This can make
risk management, IT compliance, and data quality difficult.
Industry regulations. When migrating data from on-premises local storage to the cloud,
third-party compliance can be tricky. To manage regulatory compliance and business
governance, know where data and workloads are housed.
Multi-cloud management. Multi-cloud installations can disjoin efforts to overcome cloud
computing difficulties.
Cloud functionality. Performance, such as latency, is mainly out of the organization's
control. Network and provider disruptions might impair corporate activities if companies
aren't prepared.

Private cloud-building. Private cloud architecture, development, and management can be
difficult for IT organisations and workers (Frankenfield, 2022).
2.4 Privacy and Security
Data security protects digital information from illegal access and data breaches, including
administrative and access protection, cyber threats, and hardware security. Data privacy
covers the full data lifetime. Privacy of data ensures an organization's data is used for its
intended purpose and not compromised. Data security protects data based on legislation and
industry standards. Strong data security can avoid cyberattacks and data breaches (Ghosh,
2001).
Technology generates data quicker than ever, and it's not slowing down. This relates to how
the world and businesses operate as technology advances. Businesses should prioritise data
security and privacy. Data security is a grid of interrelated ideas that protect digital data. Data
privacy is one of the cornerstones of that grid of notions that's relevant to any organisation in
the contemporary industrial scene. The global data security market is predicted to increase
from $17.5 billion in 2020 to $35.5 billion by 2026, a 12.4% CAGR. Data privacy and
security became key issues as people asked how firms gather, use, and retain data. Since data
privacy become a fascinating component of modern business, the term data compliance was
formed. Every organisation must now be data compliant, meaning they must follow the
newest data-related laws and regulations. Many companies consider data privacy a
precaution. It's your company's best tactical opportunity. By securing customer data, you'll
build your brand. Customers have various Internet-connected devices. The risk of data
breaches grows over time. Data security protects a company's data-rich websites, computers,
and databases from unwanted access. It's a safeguard against data loss or breach (Anderson,
2021).
Data security is difficult. Security experts must classify data by risk and safeguard it with
appropriate technologies and strategies. In today's competitive business world, firms
emphasise customer relationship management to win market share and differentiate service
quality. Customers want choices and easy access, which requires personal information and
preferences. Businesses want to obtain, mine, and share this information efficiently. Because
difficult for IT organisations and workers (Frankenfield, 2022).
2.4 Privacy and Security
Data security protects digital information from illegal access and data breaches, including
administrative and access protection, cyber threats, and hardware security. Data privacy
covers the full data lifetime. Privacy of data ensures an organization's data is used for its
intended purpose and not compromised. Data security protects data based on legislation and
industry standards. Strong data security can avoid cyberattacks and data breaches (Ghosh,
2001).
Technology generates data quicker than ever, and it's not slowing down. This relates to how
the world and businesses operate as technology advances. Businesses should prioritise data
security and privacy. Data security is a grid of interrelated ideas that protect digital data. Data
privacy is one of the cornerstones of that grid of notions that's relevant to any organisation in
the contemporary industrial scene. The global data security market is predicted to increase
from $17.5 billion in 2020 to $35.5 billion by 2026, a 12.4% CAGR. Data privacy and
security became key issues as people asked how firms gather, use, and retain data. Since data
privacy become a fascinating component of modern business, the term data compliance was
formed. Every organisation must now be data compliant, meaning they must follow the
newest data-related laws and regulations. Many companies consider data privacy a
precaution. It's your company's best tactical opportunity. By securing customer data, you'll
build your brand. Customers have various Internet-connected devices. The risk of data
breaches grows over time. Data security protects a company's data-rich websites, computers,
and databases from unwanted access. It's a safeguard against data loss or breach (Anderson,
2021).
Data security is difficult. Security experts must classify data by risk and safeguard it with
appropriate technologies and strategies. In today's competitive business world, firms
emphasise customer relationship management to win market share and differentiate service
quality. Customers want choices and easy access, which requires personal information and
preferences. Businesses want to obtain, mine, and share this information efficiently. Because
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

of the sensitive information they possess, financial services and healthcare are often the focus
of privacy discussions. Privacy and data protection rules influence all industries. Information
Commissioners Office (UK), and Privacy and Electronic Communications Regulations (UK)
have created their own standards to enhance current laws and regulations. Risk management
and legal departments may encounter the EU's e-privacy Directive more in 2021. The law
may be of issue to businesses that aggregate and analyse customer data to influence their
advertising efforts. Businesses may also need to manage remaining data protection issues
from 2020's quick move to remote working. Mike Russell, senior manager and head of
worldwide legal operations at Expedia Group, expects organisations to focus on infrastructure
issues such as software upgrades to mitigate breach vulnerabilities. Legal departments may
face a shortage of skilled privacy professionals in 2021. Rita Heimes, general counsel and
chief privacy officer for the International Association of Privacy Professionals, said there
aren't many three- to five-year veterans yet (Anon., 2021).
3.0 Analysis and Discussion
3.1 Collaboration Tools
Many firms adopted internet collaboration software during the pandemic and lockdowns. It
improves communication between colleagues in different places and with other parties.
Zoom and Microsoft teams were helpful collaboration tools. Millions of people are staying
home to limit the spread of COVID-19, so many have virtual happy hours, quiz evenings, and
birthday parties. Zoom, one of dozens of video conferencing services, has risen to the top
thanks to intense separation measures and resonance in this new social distance culture.
Zoom helped everyone connect; students could attend online classes, patients could meet
doctors, etc. These collaborative technologies let workers telecommute and attend meetings.
Microsoft Teams is a chat-based workspace for collaboration, communication, and sharing.
It provides a flexible, integrated, and accessible workplace for your workers. It's a messaging
software where everyone can access all chats, meetings, and notes, and a hub for working
together with security and real-time communication. This tool helped firms collaborate at
COVID-19. This technology enabled online file sharing, remote data access, management,
and data security. COVID19 and the ensuing lockdown restrictions led to massive work-
from-home shifts. Companies hurried to build tools that could keep people working together
to maintain productivity. We saw general meeting in United Nations (UN) with the help of
these tools during COVID-19 pandemic as well.
of privacy discussions. Privacy and data protection rules influence all industries. Information
Commissioners Office (UK), and Privacy and Electronic Communications Regulations (UK)
have created their own standards to enhance current laws and regulations. Risk management
and legal departments may encounter the EU's e-privacy Directive more in 2021. The law
may be of issue to businesses that aggregate and analyse customer data to influence their
advertising efforts. Businesses may also need to manage remaining data protection issues
from 2020's quick move to remote working. Mike Russell, senior manager and head of
worldwide legal operations at Expedia Group, expects organisations to focus on infrastructure
issues such as software upgrades to mitigate breach vulnerabilities. Legal departments may
face a shortage of skilled privacy professionals in 2021. Rita Heimes, general counsel and
chief privacy officer for the International Association of Privacy Professionals, said there
aren't many three- to five-year veterans yet (Anon., 2021).
3.0 Analysis and Discussion
3.1 Collaboration Tools
Many firms adopted internet collaboration software during the pandemic and lockdowns. It
improves communication between colleagues in different places and with other parties.
Zoom and Microsoft teams were helpful collaboration tools. Millions of people are staying
home to limit the spread of COVID-19, so many have virtual happy hours, quiz evenings, and
birthday parties. Zoom, one of dozens of video conferencing services, has risen to the top
thanks to intense separation measures and resonance in this new social distance culture.
Zoom helped everyone connect; students could attend online classes, patients could meet
doctors, etc. These collaborative technologies let workers telecommute and attend meetings.
Microsoft Teams is a chat-based workspace for collaboration, communication, and sharing.
It provides a flexible, integrated, and accessible workplace for your workers. It's a messaging
software where everyone can access all chats, meetings, and notes, and a hub for working
together with security and real-time communication. This tool helped firms collaborate at
COVID-19. This technology enabled online file sharing, remote data access, management,
and data security. COVID19 and the ensuing lockdown restrictions led to massive work-
from-home shifts. Companies hurried to build tools that could keep people working together
to maintain productivity. We saw general meeting in United Nations (UN) with the help of
these tools during COVID-19 pandemic as well.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3.2 Privacy and Security during pandemic
Global pandemics can cause major office and facility shutdowns, making it difficult for firms
to operate. Data centres, cloud systems, departmental servers, and digital gadgets used by
now-remote employees to keep connected to each other and to firm data become even more
important. Digital infrastructure demands surged overnight. Security and risk management
leaders must protect their firms rapidly. Their online services and digital platforms must be
cyberattack-resistant.
IT may also be stressed. IT specialists in some organisations must allow remote work for
employees who haven't before. Some service partners are included. IT departments
implement new collaborative applications. Such software increases the risk of hacking
important data in less secure remote workspaces, which might be crucial for agile teams.
Companies must reset security systems to eliminate outliers. To check for digital fence gaps,
both physical and digital systems must be restarted. System and data access rights provided
during the epidemic to enable remote work will need to be audited. IT systems must be
assessed for cracks, bad pathways, and fraud. Cybercriminals may have breached otherwise
secure facilities.
Pandemic-related cyber dangers must be acknowledged. In a shutdown, security specialists
must ensure that vital company processes can withstand cyberattacks. They'll evaluate supply
chains, particularly digital ones, to ensure health crisis continuity. Revaluate IT security
architectures. This covers access techniques, mass remote access support, and risk/context-
based authentication. Update remote access and BYOD regulations. Include cyber hygiene
controls. Deploy advanced tech. Advanced threat detection and response must use big data,
AI, and machine learning. These can recognise and respond to bad behaviour without human
interaction. Companies should also consider cyberattack insurance during a pandemic.
Security leaders must share crisis lessons. This prepares them for future pandemics.
Scalability, time to provide, cloud-based availability, and remote management must be
evaluated. They should also engage trusted partners to plan dynamic scalability and provide
needed services and solutions. Plan creatively and thoroughly. IT security leaders should
incorporate a pandemic scenario in their BCP and conduct regular drills. No one wants to be
without a tested backup. The BCP should include a strategy for pandemic cyberattacks.
Global pandemics can cause major office and facility shutdowns, making it difficult for firms
to operate. Data centres, cloud systems, departmental servers, and digital gadgets used by
now-remote employees to keep connected to each other and to firm data become even more
important. Digital infrastructure demands surged overnight. Security and risk management
leaders must protect their firms rapidly. Their online services and digital platforms must be
cyberattack-resistant.
IT may also be stressed. IT specialists in some organisations must allow remote work for
employees who haven't before. Some service partners are included. IT departments
implement new collaborative applications. Such software increases the risk of hacking
important data in less secure remote workspaces, which might be crucial for agile teams.
Companies must reset security systems to eliminate outliers. To check for digital fence gaps,
both physical and digital systems must be restarted. System and data access rights provided
during the epidemic to enable remote work will need to be audited. IT systems must be
assessed for cracks, bad pathways, and fraud. Cybercriminals may have breached otherwise
secure facilities.
Pandemic-related cyber dangers must be acknowledged. In a shutdown, security specialists
must ensure that vital company processes can withstand cyberattacks. They'll evaluate supply
chains, particularly digital ones, to ensure health crisis continuity. Revaluate IT security
architectures. This covers access techniques, mass remote access support, and risk/context-
based authentication. Update remote access and BYOD regulations. Include cyber hygiene
controls. Deploy advanced tech. Advanced threat detection and response must use big data,
AI, and machine learning. These can recognise and respond to bad behaviour without human
interaction. Companies should also consider cyberattack insurance during a pandemic.
Security leaders must share crisis lessons. This prepares them for future pandemics.
Scalability, time to provide, cloud-based availability, and remote management must be
evaluated. They should also engage trusted partners to plan dynamic scalability and provide
needed services and solutions. Plan creatively and thoroughly. IT security leaders should
incorporate a pandemic scenario in their BCP and conduct regular drills. No one wants to be
without a tested backup. The BCP should include a strategy for pandemic cyberattacks.

Leaders must adopt new approaches and technologies. Automation can improve operations
and reduce human interference. Starship Technologies debuted robot meal delivery in the UK
and San Francisco two years ago.
Companies who had delivery challenges during the pandemic might examine this solution.
New enterprises will thrive, and those working during the lockdown (such as supermarket
delivery services) will gain acceptance.
3.3 Cryptocurrency Crash
June crypto markets fell to 2022. Global crypto market cap fell to $977 billion. The global
cryptocurrency market worth has plummeted by $2 trillion since November. Almost every
top coin is half or less of its all-time high. Stablecoins are cryptocurrencies pegged to a stable
currency, usually the U.S. dollar. Tether and USD Coin are other prominent stablecoins
(USDC). "1,000 USDC tokens can be exchanged for $1,000 at any moment. Stablecoins
support crypto's parallel financial system. Bank run, basically. In May, significant
withdrawals from Anchor Protocol, a crypto bank put up by TerraUSD founder Terraform
Labs, drove TerraUSD below its $1 peg. Investors withdrew UST coins from Anchor,
spooking other investors who followed suit. The cited journal says this was the intended
system. "If TerraUSD's price drops below $1, traders can 'burn' the coin in return for $1
worth of Luna," lowering TerraUSD's supply. Traders can burn Luna and generate new
TerraUSD if TerraUSD climbs beyond $1, the Journal says, allowing the market balance
TerraUSD at its peg. If traders want Luna, the system works. When TerraUSD lost its peg,
investors didn't want Luna. This is why “stablecoin” crashed. Recently, cryptocurrencies
have crashed due to the Ukraine-Russia war, post-COVID, global inflation, and other issues
(Osipovich, 2022). So though the analysis of recent changes and activities in crypto market
and recent incident we can say that the cryptocurrency is crashing over time.
4.0 Conclusion
The use of ICT is widespread. Every trade has it. ICT is concerned with how data is
processed and acted upon, and this can be used to a wide range of activities. As well as
operating a firm, ICT has an important role in the creation and dissemination of trade data.
ICT advancements have resulted in the availability of a vast amount of data. Computer
and reduce human interference. Starship Technologies debuted robot meal delivery in the UK
and San Francisco two years ago.
Companies who had delivery challenges during the pandemic might examine this solution.
New enterprises will thrive, and those working during the lockdown (such as supermarket
delivery services) will gain acceptance.
3.3 Cryptocurrency Crash
June crypto markets fell to 2022. Global crypto market cap fell to $977 billion. The global
cryptocurrency market worth has plummeted by $2 trillion since November. Almost every
top coin is half or less of its all-time high. Stablecoins are cryptocurrencies pegged to a stable
currency, usually the U.S. dollar. Tether and USD Coin are other prominent stablecoins
(USDC). "1,000 USDC tokens can be exchanged for $1,000 at any moment. Stablecoins
support crypto's parallel financial system. Bank run, basically. In May, significant
withdrawals from Anchor Protocol, a crypto bank put up by TerraUSD founder Terraform
Labs, drove TerraUSD below its $1 peg. Investors withdrew UST coins from Anchor,
spooking other investors who followed suit. The cited journal says this was the intended
system. "If TerraUSD's price drops below $1, traders can 'burn' the coin in return for $1
worth of Luna," lowering TerraUSD's supply. Traders can burn Luna and generate new
TerraUSD if TerraUSD climbs beyond $1, the Journal says, allowing the market balance
TerraUSD at its peg. If traders want Luna, the system works. When TerraUSD lost its peg,
investors didn't want Luna. This is why “stablecoin” crashed. Recently, cryptocurrencies
have crashed due to the Ukraine-Russia war, post-COVID, global inflation, and other issues
(Osipovich, 2022). So though the analysis of recent changes and activities in crypto market
and recent incident we can say that the cryptocurrency is crashing over time.
4.0 Conclusion
The use of ICT is widespread. Every trade has it. ICT is concerned with how data is
processed and acted upon, and this can be used to a wide range of activities. As well as
operating a firm, ICT has an important role in the creation and dissemination of trade data.
ICT advancements have resulted in the availability of a vast amount of data. Computer
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.

