Analyzing ICT Tools' Role in Business Performance During Pandemic

Verified

Added on  2023/07/17

|17
|4885
|172
Report
AI Summary
This report investigates the impact of Information and Communication Technology (ICT) tools on business performance during the COVID-19 pandemic. It begins by defining ICT and its role in modern business, highlighting its importance in communication, data management, and decision-making. The report then reviews literature on collaboration tools, cloud storage, and cloud computing, discussing their advantages and disadvantages. It analyzes how these technologies facilitated remote work and maintained business operations during lockdowns. The report also addresses privacy and security concerns associated with increased digital surveillance and data collection. It concludes with recommendations for businesses to effectively leverage ICT while safeguarding sensitive information, emphasizing the need for transparency, anonymity, and adherence to privacy guidelines. This analysis provides valuable insights for public health and information specialists, aiding in future pandemic preparedness.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
Abstract
This crisis informatics project aims to provide empirical data on how the public dealt with the
COVID-19 pandemic. The findings will be shared with public health and information
specialists to better equip them to combat the current epidemic and better prepare the world for
future ones. (Shengnan Yang, 2020)
As a result of the pandemic, several governments have implemented lockdowns and banned
public gatherings. As a result, governments at all levels are turning to digital surveillance
to reduce the spread of viruses. In response to the epidemic, several countries have developed
apps for smartphones and information suppression technologies. For two weeks, no one may
meet a COVID-19 patient. Because users must install an app to access sensitive information,
this method raises privacy issues. (Akleylek, 2022)
A contact-tracing app may gather information on someone's residence, health, and fitness. In
many countries, consumers avoid using these apps because of privacy concerns. Privacy
concerns have been at the forefront of ethical discussions about the COVID-19 app because of
its data-sharing capabilities with government and health-related entities. The public has a
legitimate interest in knowing what information these apps collect, who has access to it, and
what purpose it serves. To ensure the safety of sensitive information, digital solutions must
adhere to strict privacy and security guidelines. Some of these include transparency, self-
reporting, anonymity, and anonymized data. It's also important to make your ideals clear. The
development of these apps and other solutions necessitates consideration of privacy issues.
(Akleylek, 2022)
Document Page
2
Table of Contents
Abstract ..................................................................................................................................... 1
Introduction .............................................................................................................................. 3
What exactly are the tools for contemporary communication? ....................................... 3
The Role of Information and Communication Technology in Business Performance .. 3
How has technology helped businesses throughout the pandemic? ................................ 3
Literature Review .................................................................................................................... 5
Collaboration tools ............................................................................................................... 5
The definition of a team collaboration tool .................................................................... 5
Team collaboration tool types ......................................................................................... 5
There are several benefits to using team collaboration software ................................. 5
There are advantages and disadvantages to using collaborative technologies ........... 6
Cloud Storage ....................................................................................................................... 6
What does "cloud storage" mean?.................................................................................. 6
How does data storage in the cloud work? ..................................................................... 6
The advantages and disadvantages of cloud-based data storage ................................. 7
Cloud Computing ................................................................................................................. 8
What is the definition of cloud computing? ................................................................... 8
When is it best to use cloud services? ............................................................................. 8
Cloud computing advantages and disadvantages .......................................................... 8
Privacy and Security ............................................................................................................ 9
Definitions of security and privacy ................................................................................. 9
Businesses importance of security and privacy ............................................................. 9
Analysis and Discussion ......................................................................................................... 10
Collaboration tools ............................................................................................................. 10
Comparison of Two Tools for Collaboration ............................................................... 10
How did pandemic cooperation tools help businesses? ............................................... 10
Privacy and Security during pandemic ............................................................................ 11
Private Internet .................................................................................................................. 12
Recommendation.................................................................................................................... 13
Conclusion .............................................................................................................................. 14
References ............................................................................................................................... 16
Document Page
3
Introduction
What exactly are the tools for contemporary communication?
Data collection, storage, and dissemination through digital means are all included under the
common term "information and communication technology" (ICT). Such technologies include
computers, smartphones, the internet, social media, email, and software. (StudySmarter, 2022)
Information and communication technology (ICT), composed of software, hardware, and
technology for communication, has several applications, including data processing, retrieval,
storage, transmission, and modification. The term "information and communication
technologies" (ICTs) encompasses a wide range of resources, including the Internet, intranets,
extranets, web pages, mobile apps, e-commerce sites, software robots, servers, cloud
computing services, digital communication apps, and remote work tools. (StudySmarter, 2022)
The Role of Information and Communication Technology in Business Performance
Having studied ICT technologies, it's important to assess their influence on organisations today.
In business, technology for communication and information (ICT) provides tools and
frameworks to simplify communication, data management, analysis, and decision-making. It
boosts consumer engagement, productivity, and competitiveness. Information and
communication technology (ICT) may help businesses with employee location monitoring,
data collection, storage, and analysis, e-commerce, and digital communication. (StudySmarter,
2022)
How has technology helped businesses throughout the pandemic?
Digital technology has transformed businesses in recent decades. The 2020 COVID-19
epidemic limited mobility, forcing many enterprises to use digital technology. Digital
technology's potential to boost organisations' finances has become more apparent under these
exceptional circumstances. E-mail and other ICT technologies allowed personnel to operate
remotely and keep the company running even while it was closed. Internet technologies have
improved internal and external business communication. (Eurostat, 2022)
The primary aim of this investigation is to examine the role of information and communication
technology (ICT) in the business sector, particularly in the context of the ongoing pandemic.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
The study seeks to explore how ICT has facilitated business operations and contributed to their
resilience in the face of the pandemic. Subsequently, the Literature Review section delved into
the topics of collaboration tools, storage in clouds, cloud computing, and security and privacy.
Subsequently, an analysis was conducted, and further deliberation ensued regarding
collaboration tools, the private internet, and privacy and security amidst the pandemic. I
presented recommendations pertaining to this study and arrived at the conclusions of the study.
Document Page
5
Literature Review
Collaboration tools
The definition of a team collaboration tool
This term, shortened to "team collaboration tools" or "team collaboration software," refers to a
broad variety of apps and web-based services that allow organisations and individuals to
collaborate on shared projects regardless of location. Emails and project management software
are examples. The team collaboration tool's main purpose is to let two or more people work
collaboratively towards a common objective. (Froehlich, 2022)
Team communication tools include immediate messaging, group chats, file sharing, shared
calendars, project management, audio, and video. Centrally managing these technologies
simplifies management. (Froehlich, 2022)
Team collaboration tool types
File sharing, instantaneous messaging, cloud storage, online whiteboards, document
synchronisation, phone and video conferencing, and shared calendars are the most popular
types of collaboration tools used by teams. (Froehlich, 2022)
There are several benefits to using team collaboration software
As a result of their usefulness in improving operational processes, simplifying project
management, and aiding the effective completion of tasks, collaborative technologies for team-
based work have quickly emerged as a very valuable asset in numerous corporate contexts.
Due in large part to the proliferation of geographically scattered work teams, there has been a
meteoric rise in the demand for such tools in recent years. Integrating several collaboration
tools and functions allows for a more streamlined and harmonised transmission of information,
as opposed to using separate technologies like phone, email, and teleconferencing, which need
more coordination for efficient use. (Froehlich, 2022)
Document Page
6
There are advantages and disadvantages to using collaborative technologies
Making use of the internet for cooperation has several advantages, such as removing
geographical barriers to communication and making it easier to do work from afar. However,
it does have certain negatives as well. Learning about the drawbacks of cooperation might aid
in the creation of strategies and structures to counteract them. In this article, we list some of
the major downsides of teamwork that should be considered.. (Froehlich, 2022)
Cloud Storage
What does "cloud storage" mean?
The concept of "cloud storage" pertains to the act of digitally storing data on remote servers
instead of a user's local device. The servers are operated and managed by a third-party supplier,
who assumes responsibility for safeguarding any data stored therein. The provider ensures the
perpetual accessibility of any information residing on their servers, regardless of whether it is
accessed via a private or public network. (Cloud, 2022)
How does data storage in the cloud work?
Thanks to cloud storage, you can confidently save your documents, media, and business
information on remote servers. The user's data is saved on a virtual computer that is hosted on
a real server. Data is often duplicated over many virtual machines located in multiple data
facilities across the world, since this is standard protocol for cloud service providers. When
more data storage is required, the cloud provider will react by creating more virtual computers.
Anyone with a device that can connect to the internet and open a web browser may see data
saved in the cloud. Public clouds, private clouds, hybrid clouds, and multiclouds are the four
main categories of cloud storage architectures. (Cloud, 2022)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
The advantages and disadvantages of cloud-based data storage
Cloud storage offers multiple advantages:
Overall cost: With cloud storage, firms may switch from an expensive to a more adaptive
operating model, lowering their total cost of ownership. Scalability In reaction to ebbs and
flows in demand, cloud storage may either grow (more storage is added) or shrink (less space
is needed). With cloud computing, organisations have greater leeway in their storage and
retrieval of information strategies, as well as their allocation and administration of resources
and IT infrastructure. Security Most cloud service providers provide extensive security, which
includes both physical data centre protection and innovative software and application-level
security. Leading cloud services often have zero-trust architecture, identity and access
management, and encryption. Environmental Impact: The cost of running an on-premises data
centre due to its higher energy consumption. The most trustworthy cloud service providers run
their servers on eco-friendly sources of electricity. Public clouds are designed with redundancy
(data replicated on numerous servers in different areas) in mind so that businesses may swiftly
get back up and running after a disaster. (Cloud, 2022)
The disadvantages of cloud storage:
Banking and healthcare, for example, are two industries with very stringent requirements for
how and where data may be stored and accessed. Some public cloud providers provide services
geared towards ensuring their clients' compliance with applicable laws and standards. If the
network is overloaded or the internet connection is slow, latency may result in data
transmission delays from or towards the cloud. By entrusting information to a cloud service,
you are placing your confidence in that service's commitment to always keeping that
information available in a secure environment. Although public cloud providers aim for 100%
efficiency, some problems may result in data being unreachable. (Cloud, 2022)
Many people and businesses may benefit from the many uses that cloud storage provides. A
wide variety of digital data, from individual household budgets kept in spreadsheets to massive
financial records kept in safe databases by huge corporations, may be safely maintained in the
cloud. With the help of this technology, information may be kept for as long as necessary.
(Cloud, 2022)
Document Page
8
Cloud Computing
What is the definition of cloud computing?
Cloud computing is the on-demand delivery of various computer services and resources
through the internet, such as software, hardware, data storage, networking, and software
development tools. A cloud service provider (CSP) manages the data centre where these
resources are stored. The CSP provides access to these assets for a flat monthly fee or per unit
of use. (IBM, 2022)
When is it best to use cloud services?
Cloud computing is the pay-as-you-go Internet provisioning of IT resources. Instead of buying,
installing, and maintaining on-premises gear, a cloud provider may supply computing power,
storage capacity, and database access on demand. Data backup, recovery from disasters, email,
virtual desktops, creating software, evaluation, big data analysis, and customer-facing web
applications are just some of the cloud-based services utilised by organisations of all sizes and
industries. For instance, medical technology is embracing the cloud to provide more
personalised medicines. Financial institutions use cloud computing to fight fraud in real time.
To service the millions of online clients, video game creators are increasingly using cloud
computing. (Amazon, 2022)
Cloud computing advantages and disadvantages
Cloud Advantages
Trendy cloud computing Most organisations have expanded to the cloud. Cloud storage
simplifies backup and restoration. Cloud applications' shared storage simplifies teamwork.
Easy access: Cloud storage allows international internet data access. Internet cloud architecture
increases productivity by making data accessible. Cloud computing reduces software and
hardware maintenance costs. Mobility: Cloud data is mobile. Pay-per-use iServices: API-based
cloud services with pay-per-use. Unlimited storage: We can save all our important stuff on the
cloud, including photos, videos, music, and documents. Cloud computing safeguards data.
Cloud storage safeguards data. (JavaTPoint, 2022)
Document Page
9
Cloud computing disadvantages
Cloud computing's downsides are outlined below. Internet Access: With the cloud, all data—
images, videos, audio recordings, etc.—is saved to the cloud and accessible online. Without
good internet, this data is unreachable. Cloud data is inaccessible. Vendor lock-in is the main
downside of cloud computing. Switching suppliers may be difficult for companies. Cloud
migration is difficult since different vendors offer different platforms. Since the service
supplier owns, operates, and monitors the cloud's infrastructure, cloud users have less influence
over service function and execution. Security: Cloud service providers safeguard sensitive data.
Before utilising cloud technology, you need to understand that a cloud computing service
provider would access all your company's sensitive data. Hackers may hack cloud data..
(JavaTPoint, 2022)
Privacy and Security
Definitions of security and privacy
Although they frequently connect, the realms of privacy and security for computers are
different. You should be careful about who you give access to your confidential information to
to maintain your privacy. The protection of such data and information is what is meant by the
term "security." Smartphone apps often include a "privacy policy" that must be accepted before
the app can be downloaded. In this document, we will describe the data the app will gather and
how we plan to utilise it. It is completely up to you whether you choose to accept these terms.
The safety of your data and any confidential information is of paramount importance.
Cybersecurity experts work to stop malicious actors from obtaining access to confidential data
stored online. (Okta, 2022)
Businesses importance of security and privacy
This method protects our sensitive data. Emails, records from banks, phone logs, papers,
policies, contacts, and pictures are all data. Each organisation protects consumer data. Data
security is a corporation's responsibility. This will resolve many problems and repair others.
Regular backups, password security for documents and hard drives, encryption
communication, the elimination of old data, and code words are some techniques to ensure data
privacy. Personal data security has several local and global options..
(EuropeanBusinessReview, 2022)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
Analysis and Discussion
Collaboration tools
Comparison of Two Tools for Collaboration
Team members may quickly disseminate and transfer data, and everyone has access to the same
files thanks to file sharing technologies. These programmes get rid of the time-consuming and
constrained process of transferring files over email, relieving inboxes of the disruptive flood of
huge attachments and alerts. What we often refer to as "shared files" might include everything
from plain text files to complex multimedia projects and even computer applications.
(Froehlich, 2022)
Appointment scheduling is simplified with the help of calendar sharing solutions since people
no longer must coordinate their schedules with one another. The ability to quickly find a
mutually agreeable time and extend the request is enhanced by a centralised calendar that
displays availability as well as the conflicts of all participants. This method not only facilitates
teamwork but also saves time. (Froehlich, 2022)
How did pandemic cooperation tools help businesses?
Talk of working together has increased dramatically since the outbreak. It was a new challenge
for multinational corporations. Many people find success with the support of online
collaboration tools. Collaboration between coworkers is crucial, whether you're running a
business online or offline. The ability to work together on an outbreak in real time online
provides additional advantages. It's no longer necessary to fly between cities. The elimination
of certain in-person meetings and conferences was perfect for COVID-19 and helped save both
money and the environment. (Glossop, 2021)
Document Page
11
Privacy and Security during pandemic
There are now global contact-tracing systems available to address confidentiality issues. These
applications run on Bluetooth and GPS technology. When two people are within range of each
other's Bluetooth devices, applications may identify whether they are close together (under 1.5
m) or far apart (more than 1.5 m). It may be more accurate, but it lacks geographical data.
Potentially more private and less invasive monitoring for users. Users are always being
monitored by GPS applications. (Akleylek, 2022)
App architecture may be classified as either centralised or decentralised, depending on how
data is gathered and shared inside the app. The privacy and anonymity of users may be
preserved by using such frameworks. The centralised technique involves government and
health services collecting data from everyone and then uniquely mapping it to everyone,
independent of their position with respect to COVID-19. This technique has the potential to
reduce occurrences when implemented on a large scale because of its all-encompassing nature.
Due to weak limits on data sharing, we cannot ensure user anonymity. Since there is no
centralised data server, the decentralised architecture cannot be monitored. People who are test-
averse or choose not to be tested sometimes use anonymous, publicly available sites to learn
they are infected. (Akleylek, 2022)
The data privacy division is in charge of handling sensitive information. Information
confidentiality is dependent on data collection, processing, and dissemination. In actual
situations, questions about the legitimacy of collecting and storing information, the nature of
data exchange, and so on, arise often. With the expansion of the tech-based economy,
protecting sensitive customer information has emerged as a major obstacle for businesses.
Gaining your customers' confidence requires careful data handling and adherence to a strict
data confidentiality policy. The release of data and information from several sources raises data
management challenges for COVID-19 apps and social media. When it comes to global health
and economic impact, COVID-19 is number one. One of the most successful methods of
preventing the spread of COVID-19 is the use of contact-tracking devices and technologies to
identify both primary and secondary contacts in cases that have been reported. (Akleylek, 2022)
The COVID-19 pandemic was halted because of tracking software. Governments and health
organisations created these applications utilising a wide range of technological frameworks and
theoretical principles. These applications track public information and influence users. When
Document Page
12
developing these applications, some nations ensured the privacy of their citizens. When
governments violated these privacy standards, issues ensued. However, the use of confidential
information by monitoring applications was unchecked. (Akleylek, 2022)
Private Internet
Some sites, search engines, and services may be inaccessible inside a private network. This
aids users in establishing a safe, managed network. Access to online materials is sometimes
limited on institutional and corporate networks. This method has the potential to safeguard
against malicious software and eliminate distractions. In a private network, the administrator
decides what users may see and do. The devices that are allowed to join and their bandwidth
allocations are both determined by the closed network administrator. Professionals who need
to operate in regions with no Wi-Fi or LTE access might benefit from using private networks
due to their increased security, privacy, and portability. This might happen in urban locations
with network congestion or in rural areas with limited-service availability. (Parenti, 2021)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13
Recommendation
Several companies used internet collaboration tools for the very first time during the outbreak
and shutdown. It has the potential to strengthen cross-regional collaboration and enhance
communication among coworkers. The COVID Moonshot project is a splendid example of
collaborative effort. In the previous year, scientists from all around the globe worked together
on this study. To create a medication effective against the coronavirus. Participants worked
together digitally to conduct experiments and analyse the results. As a result, the group has
made progress in drug development and plans to pilot test an oral therapy in 2019. (Glossop,
2021)
What value do online tools for communication have during a pandemic? No longer did anybody
have to go from place to place. Especially during the COVID-19 outbreak, virtual cooperation
proved to be a cost-effective and environmentally friendly alternative to conventional
conferences and meetings. The World Health Assembly took place at the height of the COVID-
19 pandemic. Hundreds of people are expected to attend the conference. Due to worldwide
lockdowns, the first ever World Health Assembly was convened digitally via the online
document collaboration platform Please Review. Without a shared digital workspace, the
meeting could not have been successful. (Glossop, 2021)
Many companies have found that using collaborative software has increased productivity,
better managed projects, and accomplished more. The need for such tools has increased as
more companies use distributed teams. Integrating collaborating tools and functions provides
for a more fluid and useful sharing of information than utilising individual technologies like
telephone, email, and teleconferences, which require more coordination. (Froehlich, 2022)
There are concerns related to privacy, technology, usability, and user feedback in contact-
tracing programmes. Many contact-tracing programmes failed because the general audience
was unhappy with them. Only Singapore's application had a penetration of over 30% among
major nations; the Australian and Swiss apps both had penetrations under 20%, while other
apps worldwide had penetration levels of under five percent. While some contact-tracing
programmes collected extraordinarily little data, others amassed substantial amounts of highly
confidential information. Users could not sign out of most of the evaluated apps without first
deleting them. Due to a lack of standardisation, contact-tracing technologies led to
incompatible silos of software. (Akleylek, 2022)
Document Page
14
Conclusion
Educating yourself on the many available collaboration tools and features is the first step in
choosing an application for team collaboration. In other businesses, capabilities like instant
messaging and file sharing take a back seat to audio and video conferencing. Some firms choose
team communication systems that emphasise project management functions like flexible
configuration. (Froehlich, 2022)
The contemporary mobile workforce can derive significant advantages from online
collaboration tools, primarily due to their capacity to facilitate work from any location and at
any time. Individuals are prone to experiencing a sense of worth when their input is recognised
and accepted, as opposed to being lost amidst extensive email correspondences. (Glossop,
2021)
Furthermore, it is widely acknowledged that effective collaboration can foster innovative
concepts and promote knowledge exchange among team members. Individuals who possess an
online platform that enables improved communication and information sharing are more
proficient at inspiring each other. A comment made on a publicly available document has the
potential to stimulate further contributions from other individuals, leading to the generation of
valuable insights and ideas. Enhanced organisational performance has a positive correlation
with increased employee engagement and commitment towards their job and its
accomplishments. (Glossop, 2021)
The global COVID-19 outbreak poses a significant challenge to public health organisations
and governments. The epidemic put a strain on healthcare services and altered routines for
individuals and businesses. Digital contact-tracing smartphone apps were developed and used
by public health organisations. Manual contact tracing and monitoring strategies may be
feasible for controlling COVID-19 if contact tracing initiatives are implemented. Consumers
who value their privacy, however, tend to avoid using digital surveillance software. For the
sake of individual liberty, governments and health agencies should act here. (Akleylek, 2022)
Since these programmes are opt-in in most countries, their uptake and prevalence are difficult
to predict. If governments and healthcare institutions want people to have faith in them, they
need to be open about how they handle personal information. When authorities deal with
privacy concerns, contact-tracing systems perform at their best. Through their efforts, the value
Document Page
15
of digital contact-tracing technologies for preventing and responding to future pandemics will
be established. (Akleylek, 2022)
There may be less cause for concern if the government mandates a stringent data privacy
standard for digital health applications. Governments may also utilise fully decentralised, very
precise software that is as precise as the centralised way but does not keep confidential
information. One decentralised option is a software programme built on the blockchain that
strikes a balance between individuals' and the public's health. The proliferation of innovative
contact-tracing tools depends on the Internet's middlemen addressing privacy and surveillance
concerns with governments and civic society. (Akleylek, 2022)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16
References
Akleylek, S. (2022). Data privacy during pandemics: a systematic literature review of
COVID-19 smartphone applications. Retrieved 05 18, 2023, from
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8771796/
Amazon. (2022). What is cloud computing? Retrieved 05 14, 2023, from
https://aws.amazon.com/what-is-cloud-computing/
Cloud. (2022). What is Cloud Storage? Retrieved 05 12, 2023, from
https://cloud.google.com/learn/what-is-cloud-storage
EuropeanBusinessReview. (2022). Why Data Privacy is Important in Businesses. Retrieved
05 16, 2023, from https://www.europeanbusinessreview.com/why-data-privacy-is-
important-in-businesses/
Eurostat. (2022). Impact of COVID-19 on the use of ICT in enterprises. Retrieved 05 10,
2023, from https://ec.europa.eu/eurostat/statistics-
explained/index.php?title=Impact_of_COVID-19_on_the_use_of_ICT_in_enterprises
Froehlich, A. (2022). Team collaboration tools. Retrieved 05 11, 2023, from
https://www.techtarget.com/searchunifiedcommunications/definition/team-
collaboration-tools
Glossop, A. (2021). 5 benefits of online collaboration tools. Retrieved 05 17, 2023, from
https://www.ideagen.com/thought-leadership/blog/5-benefits-of-online-collaboration-
tools
IBM. (2022). What is cloud computing? Retrieved 05 13, 2023, from
https://www.ibm.com/topics/cloud-computing
JavaTPoint. (2022). Advantages and Disadvantages of Cloud Computing. Retrieved 05 14,
2023, from https://www.javatpoint.com/advantages-and-disadvantages-of-cloud-
computing
Okta. (2022). Privacy vs. Security: Exploring the Differences & Relationship. Retrieved 05
15, 2023, from https://www.okta.com/identity-101/privacy-vs-security/
Parenti, D. (2021). The Benefits of Private Wireless Networks. Retrieved 05 19, 2023, from
https://www.mccr.info/blog/product-reviews-comparisons/the-benefits-of-a-private-
network
Shengnan Yang, P. F. (2020). The use of ICT during COVID‐19. Retrieved 05 20, 2023, from
https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7645918/
StudySmarter. (2022). Information and Communication Technology in Business. Retrieved
05 10, 2023, from https://www.studysmarter.co.uk/explanations/business-
studies/influences-on-business/information-and-communication-technology-in-
business/
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]