CFPBUS006 - Integrated Professional Skills in the Digital Age: Report
VerifiedAdded on 2021/02/21
|12
|3301
|902
Report
AI Summary
This report, focusing on CFPBUS006 - Integrated Professional Skills in the Digital Age, delves into the critical importance of digital skills for professional growth and organizational success. It examines the positive impacts of the internet on businesses and society, such as marketing advancements, online business opportunities, and business automation, while also addressing negative aspects like increased competition and security threats. The report highlights various internet threats including hacking, phishing, viruses, spam, malware, and password cracking, and emphasizes the security and privacy measures needed when using online services. Furthermore, it provides a comparative analysis of unified communication providers, such as 3CX and Indigo, showcasing their features and business applications. Overall, the report provides a comprehensive overview of digital skills, their applications, and the challenges and opportunities they present in the modern business environment.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

CFPBUS006 - Integrated Professional
Skills in the Digital Age
Skills in the Digital Age
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
Positive use of internet to businesses and society-......................................................................3
Negative use of internet to businesses and society-.....................................................................4
Internet threats faced by organization and society- ....................................................................5
Unified communications providers-............................................................................................8
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................11
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
Positive use of internet to businesses and society-......................................................................3
Negative use of internet to businesses and society-.....................................................................4
Internet threats faced by organization and society- ....................................................................5
Unified communications providers-............................................................................................8
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................11

INTRODUCTION
Integrated professional skills in the digital age is essentially required for the growth of
yourself and your organization. Digital age skills means a person have the ability to create new
knowledge and information according to 21st century skills. These skills is necessarily needed to
connecting world. There are many professional skills required in a digital age- with the basic
communication skills, a person should also need to enhance their social media communication
skills. A person and an organization should have as ability to learn new technologies, new
methods for conducting operations and new equipments. For building the unbreakable trust,
ethics and responsibilities are highly needed. Critical thinking, teamwork, reflection, originality,
creativity, personal resilience and problem-solving are the major thinking skills and most
important for a business development. This report will includes, one of the most significant skill
i.e. digital skills. This skill is properly depends on the use of technology. However, the usage of
digital technology required to be integrated with the basic knowledge. This report will also
include the positive use of internet in business and society and also described the negative use of
internet that will affect the business and society. This report will also highlight the threats of
internet uses that are faced by organization or by society and also discusses the privacy and
security taken by internet user when online services or internet application are used. These report
will also highlight the features, applications and business uses of unified communication
providers in the business.
MAIN BODY
Positive use of internet to businesses and society-
Internet is very beneficial that can make people's life more convenient. An internet offers
many opportunities to business and society to pursue its objectives and goals. Internet helps
businesses to connects consumers (Matt, Hess and Benlian 2015). Internet largely used in
business management, marketing, production, purchasing, selling, all the management in
accounts and tax and many other activities. Internet is most important source of all types of
business models, technologies and innovations. Mostly companies and entrepreneurs investing in
e-commerce, digital marketing, online collaboration tools and business automation for enhance
the operations and productivity. Thus, internet affects the businesses, societies, environment,
politics, employment, education and entrepreneurship.
Integrated professional skills in the digital age is essentially required for the growth of
yourself and your organization. Digital age skills means a person have the ability to create new
knowledge and information according to 21st century skills. These skills is necessarily needed to
connecting world. There are many professional skills required in a digital age- with the basic
communication skills, a person should also need to enhance their social media communication
skills. A person and an organization should have as ability to learn new technologies, new
methods for conducting operations and new equipments. For building the unbreakable trust,
ethics and responsibilities are highly needed. Critical thinking, teamwork, reflection, originality,
creativity, personal resilience and problem-solving are the major thinking skills and most
important for a business development. This report will includes, one of the most significant skill
i.e. digital skills. This skill is properly depends on the use of technology. However, the usage of
digital technology required to be integrated with the basic knowledge. This report will also
include the positive use of internet in business and society and also described the negative use of
internet that will affect the business and society. This report will also highlight the threats of
internet uses that are faced by organization or by society and also discusses the privacy and
security taken by internet user when online services or internet application are used. These report
will also highlight the features, applications and business uses of unified communication
providers in the business.
MAIN BODY
Positive use of internet to businesses and society-
Internet is very beneficial that can make people's life more convenient. An internet offers
many opportunities to business and society to pursue its objectives and goals. Internet helps
businesses to connects consumers (Matt, Hess and Benlian 2015). Internet largely used in
business management, marketing, production, purchasing, selling, all the management in
accounts and tax and many other activities. Internet is most important source of all types of
business models, technologies and innovations. Mostly companies and entrepreneurs investing in
e-commerce, digital marketing, online collaboration tools and business automation for enhance
the operations and productivity. Thus, internet affects the businesses, societies, environment,
politics, employment, education and entrepreneurship.

Positive use of internet to businesses-
Marketing advancement\Digital marketing- With the help of internet organizations can use a
social media, websites, emails, search engine to promote their products and services on the
digital platform. Digital marketing helps the business to advertise their products and services at
social and search channels at budgeted cost (Singh and Hess 2017).
Opportunities of Online business- Internet provides an immense opportunity to develop their
business online. Internet offers various opportunities such as e-commerce, web development,
content writing, digital marketing, publishing and also affiliate marketing, by which the
employment and development are increasing quickly.
Business automation- Business automation is more essential in high challenging and
complicated work. In this process all the daily business works, operations, tasks is programmed
in software and that can run business automatically. It can reduced human's high risk works and
encourages robotic interface, that will increase the productivity and reduce the expense of
maintaining big teams (Laudon and Traver, 2016).
Employee online training software- For the employee skill development and training, there are
several online training programme and degree programmes available on internet. Because skilled
and talented workforce is necessarily needed for more innovation and production in the business.
Positive use of internet to society-
Fast communication with friends, relatives and family- Internet helps in creating effective
communication between persons. It can also help a person to build social relationships with
society. Many internet services like Gmail and Skype provides effective services to communicate
any part of the world.
Opportunities of working from home- internet provides an opportunity to earn online. By
Online posting of advertisements, online home businesses can reduce the total cost and increase
productivity.
Social development- Internet plays a vital role in society for consistent social development.
With the help of internet various social workers attract larger audience on environmental, social
and personal topics through articles, infographics and social media. It can create many
communications platforms for societies.
Negative use of internet to businesses and society-
Negative use of internet to businesses-
Marketing advancement\Digital marketing- With the help of internet organizations can use a
social media, websites, emails, search engine to promote their products and services on the
digital platform. Digital marketing helps the business to advertise their products and services at
social and search channels at budgeted cost (Singh and Hess 2017).
Opportunities of Online business- Internet provides an immense opportunity to develop their
business online. Internet offers various opportunities such as e-commerce, web development,
content writing, digital marketing, publishing and also affiliate marketing, by which the
employment and development are increasing quickly.
Business automation- Business automation is more essential in high challenging and
complicated work. In this process all the daily business works, operations, tasks is programmed
in software and that can run business automatically. It can reduced human's high risk works and
encourages robotic interface, that will increase the productivity and reduce the expense of
maintaining big teams (Laudon and Traver, 2016).
Employee online training software- For the employee skill development and training, there are
several online training programme and degree programmes available on internet. Because skilled
and talented workforce is necessarily needed for more innovation and production in the business.
Positive use of internet to society-
Fast communication with friends, relatives and family- Internet helps in creating effective
communication between persons. It can also help a person to build social relationships with
society. Many internet services like Gmail and Skype provides effective services to communicate
any part of the world.
Opportunities of working from home- internet provides an opportunity to earn online. By
Online posting of advertisements, online home businesses can reduce the total cost and increase
productivity.
Social development- Internet plays a vital role in society for consistent social development.
With the help of internet various social workers attract larger audience on environmental, social
and personal topics through articles, infographics and social media. It can create many
communications platforms for societies.
Negative use of internet to businesses and society-
Negative use of internet to businesses-
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Attraction towards online education- Today, people are learning any technical degree and
courses online and that can negatively affects the business of coaching centres and local
educational institutes (Bock, Iansiti and Lakhani, 2017).
Increase competition- Internet majorly attracts new competitors form many business areas. It
can also enhance the competition on the internet for many businesses. These will encourages all
offline business to expand its presence on the internet for its business development (Anderson,
2017).
Variables in consumers trends- Every consumer demand the revolutionized services and
products from organization. Due to availability of trending information and news on the internet,
customers desires, trends, styles, priorities and expectations are changing continuously. So,
business have to upgraded itself time to time and that can increase the expenses.
Security- Internet occurs various security threats in businesses such as e-terrorism, viruses,
hackers etc.
Reduced productivity- Employees in the organization use internet in their work and may spend
most of their time in web surfing and replying to personal emails that all these activities
negatively affects the production process in business.
Negative use of internet to society-
Produce inappropriate material- Internet can produce various inappropriate and illegal
materials (Nurse, Creese and De Roure 2017). Many people illegally download other's copyright
content and use it. This action may generates various lawsuits.
End of offline communication- Internet is the main reason for destroy of human touch, ending
the offline communication and face to face connectivity with the people. For example- if you
order food from online but you never know how and who is cook.
People get addicted to online social network and online games- Children and adults spend
their precious time in playing online games otherwise they should use this time in something
more productive activities (Gendron, 2015). That all are can disturb a person's personal and
professional activities.
Criminal use- Criminal uses of internet increasing crucially. Some people use the internet for
catch debit or credit card details for criminal purpose.
courses online and that can negatively affects the business of coaching centres and local
educational institutes (Bock, Iansiti and Lakhani, 2017).
Increase competition- Internet majorly attracts new competitors form many business areas. It
can also enhance the competition on the internet for many businesses. These will encourages all
offline business to expand its presence on the internet for its business development (Anderson,
2017).
Variables in consumers trends- Every consumer demand the revolutionized services and
products from organization. Due to availability of trending information and news on the internet,
customers desires, trends, styles, priorities and expectations are changing continuously. So,
business have to upgraded itself time to time and that can increase the expenses.
Security- Internet occurs various security threats in businesses such as e-terrorism, viruses,
hackers etc.
Reduced productivity- Employees in the organization use internet in their work and may spend
most of their time in web surfing and replying to personal emails that all these activities
negatively affects the production process in business.
Negative use of internet to society-
Produce inappropriate material- Internet can produce various inappropriate and illegal
materials (Nurse, Creese and De Roure 2017). Many people illegally download other's copyright
content and use it. This action may generates various lawsuits.
End of offline communication- Internet is the main reason for destroy of human touch, ending
the offline communication and face to face connectivity with the people. For example- if you
order food from online but you never know how and who is cook.
People get addicted to online social network and online games- Children and adults spend
their precious time in playing online games otherwise they should use this time in something
more productive activities (Gendron, 2015). That all are can disturb a person's personal and
professional activities.
Criminal use- Criminal uses of internet increasing crucially. Some people use the internet for
catch debit or credit card details for criminal purpose.

Internet threats faced by organization and society-
Internet threats may generates various risks such as loss of confidential data and
information, damaged reputation, financial losses, identity theft, reduce customer trust in online
banking and e-commerce. There are many internet threats that are faced by organisation and
society when using the internet-
Hacking
Hacking is criminal process by which cyber criminals takes actions to gain unauthorized access
to others computer. The informations and data's available on the techniques and tools that will
encourages criminals to undertake despiteful activities. Hacker collects weaknesses in the
company's security and privacy setting and use them to access all data and information of
business.
Phishing
Phishing is one of the most the greatest risks that are generated from internet. It is largely uses by
cyber criminals because its execution is done with a very little efforts and its very easy process to
conduct. Phishing is used for generating fake emails, websites and messages that are look like
similar as they are from authentic organization. Phishing is executed to catch financial and
personal information from you (Knickrehm, Berthon and Daugherty, 2016).
Virus
Many computer programs send email attachment or download to majorly infects to computer.
This may also affect other computers in your contact list. Virus may be automatic download by
just visiting a site. Virus in computer may affects their business in various types- virus provides a
criminal to access your all data and information in computer. Is can disable security setting, hack
your web browser and display unnecessary ads. If the virus is attached to your system that it can
destroy hard drive and system's external drives. It can also infect other system if virus influence
system attached to them.
Spam
Spam is the process by which system send and collect information from unsuspecting people. It
is the most common method of distributing unsolicited messages, pornography and
advertisement which are available on the social networking sites, personal blogs and websites of
company ((Matt, Hess and Benlian 2015)). This can affect the systems functions by unnecessary
junk mails. Spam will encourage various activities like scams, threats, malware and fraud to your
Internet threats may generates various risks such as loss of confidential data and
information, damaged reputation, financial losses, identity theft, reduce customer trust in online
banking and e-commerce. There are many internet threats that are faced by organisation and
society when using the internet-
Hacking
Hacking is criminal process by which cyber criminals takes actions to gain unauthorized access
to others computer. The informations and data's available on the techniques and tools that will
encourages criminals to undertake despiteful activities. Hacker collects weaknesses in the
company's security and privacy setting and use them to access all data and information of
business.
Phishing
Phishing is one of the most the greatest risks that are generated from internet. It is largely uses by
cyber criminals because its execution is done with a very little efforts and its very easy process to
conduct. Phishing is used for generating fake emails, websites and messages that are look like
similar as they are from authentic organization. Phishing is executed to catch financial and
personal information from you (Knickrehm, Berthon and Daugherty, 2016).
Virus
Many computer programs send email attachment or download to majorly infects to computer.
This may also affect other computers in your contact list. Virus may be automatic download by
just visiting a site. Virus in computer may affects their business in various types- virus provides a
criminal to access your all data and information in computer. Is can disable security setting, hack
your web browser and display unnecessary ads. If the virus is attached to your system that it can
destroy hard drive and system's external drives. It can also infect other system if virus influence
system attached to them.
Spam
Spam is the process by which system send and collect information from unsuspecting people. It
is the most common method of distributing unsolicited messages, pornography and
advertisement which are available on the social networking sites, personal blogs and websites of
company ((Matt, Hess and Benlian 2015)). This can affect the systems functions by unnecessary
junk mails. Spam will encourage various activities like scams, threats, malware and fraud to your

security and privacy. It will increase a pressure on businesses and communication services
provides to filter and sort electronic messages.
Malware
Malware is the more common way to damage or harm your computer. Malware is malicious
software that can corrupt your system. It has various types such as Trojan horses, adware,
worms, computer virus and spyware. It can infects your computer deeply and automatically
delete or alter files. It may steal sensitive data and information and take total control of other's
computer and it's software (Beck, Dumay and Frost, 2017).
Pharming
It is a online fraud, it can redirect you to a malicious website even if the correct URL is entered.
It can create a picture that the site is actual and looking almost similar to the real site, on this
trust you may share your private information to someone and they may use this information for
wrong purpose.
Password Cracking
In this method the cyber criminals will try password cracking and guess passwords continuously
and repeatedly. This process is used by cyber criminals to enter in your system, steal confidential
data or information and cause mischief.
Botnets
A group of software bots creates several infected computers. Botnets spread various types of
malware. By this cyber criminal use your system against other systems and also send spam virus
attached messages or emails.
Security and privacy that should be taken when internet applications or services are used
online-
On internet there are many chances are occurs when someone searches your name or social
media profile and your address, parents name and contact numbers are appeared too. We should
have been taken security or privacy when internet services or applications are used online-
Compliance with cyber security policies- If we are sign in our personal social media accounts,
saving passwords on word document or connecting organisation's device to unsecured network
than it's very essential to focused on it and compliance it's policies (Maréchal, 2017).
Secure Browser- When you browse anything, you should have to very careful because websites
and marketers could tracking you on what you are searching. You can eliminate advertisers from
provides to filter and sort electronic messages.
Malware
Malware is the more common way to damage or harm your computer. Malware is malicious
software that can corrupt your system. It has various types such as Trojan horses, adware,
worms, computer virus and spyware. It can infects your computer deeply and automatically
delete or alter files. It may steal sensitive data and information and take total control of other's
computer and it's software (Beck, Dumay and Frost, 2017).
Pharming
It is a online fraud, it can redirect you to a malicious website even if the correct URL is entered.
It can create a picture that the site is actual and looking almost similar to the real site, on this
trust you may share your private information to someone and they may use this information for
wrong purpose.
Password Cracking
In this method the cyber criminals will try password cracking and guess passwords continuously
and repeatedly. This process is used by cyber criminals to enter in your system, steal confidential
data or information and cause mischief.
Botnets
A group of software bots creates several infected computers. Botnets spread various types of
malware. By this cyber criminal use your system against other systems and also send spam virus
attached messages or emails.
Security and privacy that should be taken when internet applications or services are used
online-
On internet there are many chances are occurs when someone searches your name or social
media profile and your address, parents name and contact numbers are appeared too. We should
have been taken security or privacy when internet services or applications are used online-
Compliance with cyber security policies- If we are sign in our personal social media accounts,
saving passwords on word document or connecting organisation's device to unsecured network
than it's very essential to focused on it and compliance it's policies (Maréchal, 2017).
Secure Browser- When you browse anything, you should have to very careful because websites
and marketers could tracking you on what you are searching. You can eliminate advertisers from
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

your browser by turning off third- party cookies. Use of Privacy badger browser plug-in for
Firefox, opera and Chrome, which eliminates various trackers automatically.
Careful about social media sharing- Be very careful when or what you share on social media.
Because this sharing post can be used by trackers to know everything about your current status.
So, firstly you have to lock down your account and share only with those people that you want to
share like friends or family.
Switch Search engine- Use that search engine website that doesn't track your personal
information and you can search without any destruction (Laudon and Traver, 2016).
Virus free computer- For protecting the computer from virus, firstly generate antivirus program
and keep all your software updated to eliminate security holes.
Unified communications providers-
Compare between unified communication providers-
3CX Indigo
3CX will enhance business communication to
the upgraded level.
Indigo unified communication has a main aim
to simplify the process of IT (Knickrehm,
Berthon and Daugherty, 2016).
3CX helps in improving collaboration, enhance
mobility, increase the customer experience and
boost productivity.
Indigo unified communication includes IT
services, print and connectivity, business
mobile and hosted telecoms services.
With the help of 3CX modern, smartphone
applications and intuitive VolP smartphone
users have quick access to communication way
s such as web conferencing, instant messaging,
fax and many other (Muzellec, Ronteau and
Lambkin, 2015).
Indigo's experienced technical team and
accounts managers support a various kind of
secure unified communications products and
solutions and present impartial advice from all
over the leading providers.
3CX has a ability to know the presence of
other users.
Indigo has a feature of unified messaging such
as they maintained one inbox for voicemail or
faxes or emails.
Firefox, opera and Chrome, which eliminates various trackers automatically.
Careful about social media sharing- Be very careful when or what you share on social media.
Because this sharing post can be used by trackers to know everything about your current status.
So, firstly you have to lock down your account and share only with those people that you want to
share like friends or family.
Switch Search engine- Use that search engine website that doesn't track your personal
information and you can search without any destruction (Laudon and Traver, 2016).
Virus free computer- For protecting the computer from virus, firstly generate antivirus program
and keep all your software updated to eliminate security holes.
Unified communications providers-
Compare between unified communication providers-
3CX Indigo
3CX will enhance business communication to
the upgraded level.
Indigo unified communication has a main aim
to simplify the process of IT (Knickrehm,
Berthon and Daugherty, 2016).
3CX helps in improving collaboration, enhance
mobility, increase the customer experience and
boost productivity.
Indigo unified communication includes IT
services, print and connectivity, business
mobile and hosted telecoms services.
With the help of 3CX modern, smartphone
applications and intuitive VolP smartphone
users have quick access to communication way
s such as web conferencing, instant messaging,
fax and many other (Muzellec, Ronteau and
Lambkin, 2015).
Indigo's experienced technical team and
accounts managers support a various kind of
secure unified communications products and
solutions and present impartial advice from all
over the leading providers.
3CX has a ability to know the presence of
other users.
Indigo has a feature of unified messaging such
as they maintained one inbox for voicemail or
faxes or emails.

3CX create a integrated web conferencing. It
has various audio and web conferencing
significant that will improve business
communication at a next level (Singh and Hess
2017).
Indigo developed a great feature for quick and
fast communication such as instant messaging
and chat. That will also improve the work
efficient of operations of business.
3CX has also developed a click to dial feature.
This features will work on outlook and web
browser (Young, 2017).
It has facilitated enlargement dialling across all
the area weather it is domestic or international.
3CX titanium partner is a Spitfire. 3CX system is very important in effective
communication in business. It has been developed to work effectively with Spitfire. With the use
of Microsoft windows and SIP handsets and technology, 3CX generates a great combination of
reliability, flexibility and various brilliant features.
3CX and indigo's suitability for businesses-
3CX helps to improve productivity in the business because by which user can access and
share files and data from centralized situation. It also helps in documents collaboration in real
time. It can effectively affect the business and support in its development. 3CX conduct video
and audio conferences at the same time with multiple team workforce or members. It can allows
a faster and quicker integration with the clients.
Indigo unified communication produce a quick and fast communication such as instant
messaging and chat that will improve and enhance the work efficient of operations of business. It
offers most the latest collaboration and communication tools, that will help in updated and
upgraded your business ((Matt, Hess and Benlian 2015)). It will also ensure to business that the
business meet users expectations in the digital communication age, Indigo unified
communication encourages you to be flexible on every situation and react on unforeseen task.
CONCLUSION
From the above report, it is concluded that the effects of internet on the people can be
both negative and positive. We have to manage this technology for people's overall development
and benefits. However, it is very necessary to take actions against internet security and privacy to
prevent negative effects of the internet. When internet services and application are used online,
has various audio and web conferencing
significant that will improve business
communication at a next level (Singh and Hess
2017).
Indigo developed a great feature for quick and
fast communication such as instant messaging
and chat. That will also improve the work
efficient of operations of business.
3CX has also developed a click to dial feature.
This features will work on outlook and web
browser (Young, 2017).
It has facilitated enlargement dialling across all
the area weather it is domestic or international.
3CX titanium partner is a Spitfire. 3CX system is very important in effective
communication in business. It has been developed to work effectively with Spitfire. With the use
of Microsoft windows and SIP handsets and technology, 3CX generates a great combination of
reliability, flexibility and various brilliant features.
3CX and indigo's suitability for businesses-
3CX helps to improve productivity in the business because by which user can access and
share files and data from centralized situation. It also helps in documents collaboration in real
time. It can effectively affect the business and support in its development. 3CX conduct video
and audio conferences at the same time with multiple team workforce or members. It can allows
a faster and quicker integration with the clients.
Indigo unified communication produce a quick and fast communication such as instant
messaging and chat that will improve and enhance the work efficient of operations of business. It
offers most the latest collaboration and communication tools, that will help in updated and
upgraded your business ((Matt, Hess and Benlian 2015)). It will also ensure to business that the
business meet users expectations in the digital communication age, Indigo unified
communication encourages you to be flexible on every situation and react on unforeseen task.
CONCLUSION
From the above report, it is concluded that the effects of internet on the people can be
both negative and positive. We have to manage this technology for people's overall development
and benefits. However, it is very necessary to take actions against internet security and privacy to
prevent negative effects of the internet. When internet services and application are used online,

person should take essential prevention to protect and secure their confidential data and
information. In UK various unified communications providers for the business development.
3CX and Indigo unified communications plays an important role in the growth of any business. It
has provides many effective and instant communications features. 3CX and Indigo unified
communication create a integrated web and audio conferencing that will improve business
communication at a great level.
information. In UK various unified communications providers for the business development.
3CX and Indigo unified communications plays an important role in the growth of any business. It
has provides many effective and instant communications features. 3CX and Indigo unified
communication create a integrated web and audio conferencing that will improve business
communication at a great level.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

REFERENCES
Books and journal
Matt, C., Hess, T. and Benlian, A., 2015. Digital transformation strategies. Business &
Information Systems Engineering. 57(5). pp.339-343.
Singh, A. and Hess, T., 2017. How Chief Digital Officers Promote the Digital Transformation of
their Companies. MIS Quarterly Executive. 16(1).
Knickrehm, M., Berthon, B. and Daugherty, P., 2016. Digital disruption: The growth
multiplier. Accenture Strategy.
Laudon, K. C. and Traver, C.G., 2016. E-commerce: business, technology, society.
Bock, R., Iansiti, M. and Lakhani, K. R., 2017. What the companies on the right side of the
digital business divide have in common. Harvard Business Review.
Muzellec, L., Ronteau, S. and Lambkin, M., 2015. Two-sided Internet platforms: A business
model lifecycle perspective. Industrial Marketing Management. 45. pp.139-150.
Tarofder, A. K., Azam, S. F. and Jalal, A. N., 2017. Operational or strategic benefits: Empirical
investigation of internet adoption in supply chain management. Management Research
Review. 40(1). pp.28-52.
Nurse, J. R., Creese, S. and De Roure, D., 2017. Security risk assessment in Internet of Things
systems. IT Professional. 19(5). pp.20-26.
Anderson, A., 2017. Risk, terrorism, and the Internet. In Technology and Terrorism (pp. 155-
165). Routledge.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility. 4(1). pp.65-88.
Gendron, Y., 2015. Accounting academia and the threat of the paying-off mentality. Critical
Perspectives on Accounting. 26. pp.168-176.
Beck, C., Dumay, J. and Frost, G., 2017. In pursuit of a ‘single source of truth’: from threatened
legitimacy to integrated reporting. Journal of Business Ethics. 141(1). pp.191-205.
Maréchal, N., 2017. Networked authoritarianism and the geopolitics of information:
Understanding Russian Internet policy. Media and Communication. 5(1). pp.29-41.
Laudon, K. C. and Traver, C. G., 2016. E-commerce: business, technology, society.
Books and journal
Matt, C., Hess, T. and Benlian, A., 2015. Digital transformation strategies. Business &
Information Systems Engineering. 57(5). pp.339-343.
Singh, A. and Hess, T., 2017. How Chief Digital Officers Promote the Digital Transformation of
their Companies. MIS Quarterly Executive. 16(1).
Knickrehm, M., Berthon, B. and Daugherty, P., 2016. Digital disruption: The growth
multiplier. Accenture Strategy.
Laudon, K. C. and Traver, C.G., 2016. E-commerce: business, technology, society.
Bock, R., Iansiti, M. and Lakhani, K. R., 2017. What the companies on the right side of the
digital business divide have in common. Harvard Business Review.
Muzellec, L., Ronteau, S. and Lambkin, M., 2015. Two-sided Internet platforms: A business
model lifecycle perspective. Industrial Marketing Management. 45. pp.139-150.
Tarofder, A. K., Azam, S. F. and Jalal, A. N., 2017. Operational or strategic benefits: Empirical
investigation of internet adoption in supply chain management. Management Research
Review. 40(1). pp.28-52.
Nurse, J. R., Creese, S. and De Roure, D., 2017. Security risk assessment in Internet of Things
systems. IT Professional. 19(5). pp.20-26.
Anderson, A., 2017. Risk, terrorism, and the Internet. In Technology and Terrorism (pp. 155-
165). Routledge.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility. 4(1). pp.65-88.
Gendron, Y., 2015. Accounting academia and the threat of the paying-off mentality. Critical
Perspectives on Accounting. 26. pp.168-176.
Beck, C., Dumay, J. and Frost, G., 2017. In pursuit of a ‘single source of truth’: from threatened
legitimacy to integrated reporting. Journal of Business Ethics. 141(1). pp.191-205.
Maréchal, N., 2017. Networked authoritarianism and the geopolitics of information:
Understanding Russian Internet policy. Media and Communication. 5(1). pp.29-41.
Laudon, K. C. and Traver, C. G., 2016. E-commerce: business, technology, society.

Young, J. A., 2017. Facebook, Twitter, and blogs: The adoption and utilization of social media in
nonprofit human service organizations. Human Service Organizations: Management, Leadership
& Governance. 41(1). pp.44-57.
nonprofit human service organizations. Human Service Organizations: Management, Leadership
& Governance. 41(1). pp.44-57.
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.