Analysis of Professional Skills and Technologies in the Digital Age
VerifiedAdded on 2023/06/10
|13
|3610
|314
Report
AI Summary
This report provides an overview of essential professional skills and technologies relevant to the digital age. It explores various collaboration tools, their uses, advantages, and disadvantages, highlighting examples like Zoom and GoToMeeting. The report also delves into cloud storage and cloud computing, discussing their benefits, drawbacks, suitability, and applications, with a focus on data backup and security. Furthermore, it addresses the critical aspects of privacy and security in business, including obligations, potential threats during pandemics, and preventative measures. The analysis also includes a discussion on how collaboration tools assisted businesses during the COVID-19 pandemic and outlines capable privacy and security threats businesses may have faced, along with steps taken to mitigate these risks. Desklib offers a wealth of similar resources for students seeking academic support.

Professional skills in
the digital age
the digital age
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
The aim of this report is going to discuss about the new as well as latest technologies
which are utilized by the company management within their organisation in order to carry out the
different business functions. Different types of elements like digitalisation and collaborating
tools are taken into account by the organization. The following report is based on the skills as
well as the abilities which are needed in the digital world. There are different types of digital
platform like cloud computing which is essential to be effective and effectual store the
information in ethical manner.
The aim of this report is going to discuss about the new as well as latest technologies
which are utilized by the company management within their organisation in order to carry out the
different business functions. Different types of elements like digitalisation and collaborating
tools are taken into account by the organization. The following report is based on the skills as
well as the abilities which are needed in the digital world. There are different types of digital
platform like cloud computing which is essential to be effective and effectual store the
information in ethical manner.

Table of Contents
Abstract ...........................................................................................................................................2
INTRODUCTION ..........................................................................................................................5
Literature review .............................................................................................................................5
Collaboration tools ..........................................................................................................................5
What are collaboration tools? Give some examples of collaboration tools................................5
Where are they used and what are they used for? ......................................................................5
What are advantages and disadvantages of collaboration tools in general?...............................6
Cloud Storage ..................................................................................................................................6
What is it ? ................................................................................................................................6
What is it used ? .........................................................................................................................6
What are the advantages, disadvantage s and suitability and applications of cloud storage? ....7
Clout computing ..............................................................................................................................7
What is it ? ................................................................................................................................7
What is it used ? .........................................................................................................................8
What are the advantages, disadvantages and suitability and applications of cloud computing ?
.....................................................................................................................................................8
TASK ..............................................................................................................................................8
What is privacy and security ?....................................................................................................8
What is the significance of privacy and security in business ? ............................................9
What are the obligations which is link to the privacy and security for business ?................9
Select any two collaboration tools and discuss regarding them in details - ..........................9
How did they assist business while pandemic ? ..................................................................10
Determine capable privacy and security threats business may have to face while
pandemic- .................................................................................................................................10
What steps has been taken to save themselves from these threats -...................................11
what are the measures business can take to prevent or save themselves from these threats ?
...................................................................................................................................................11
CONCLUSION .............................................................................................................................12
REFRENCES.................................................................................................................................12
Abstract ...........................................................................................................................................2
INTRODUCTION ..........................................................................................................................5
Literature review .............................................................................................................................5
Collaboration tools ..........................................................................................................................5
What are collaboration tools? Give some examples of collaboration tools................................5
Where are they used and what are they used for? ......................................................................5
What are advantages and disadvantages of collaboration tools in general?...............................6
Cloud Storage ..................................................................................................................................6
What is it ? ................................................................................................................................6
What is it used ? .........................................................................................................................6
What are the advantages, disadvantage s and suitability and applications of cloud storage? ....7
Clout computing ..............................................................................................................................7
What is it ? ................................................................................................................................7
What is it used ? .........................................................................................................................8
What are the advantages, disadvantages and suitability and applications of cloud computing ?
.....................................................................................................................................................8
TASK ..............................................................................................................................................8
What is privacy and security ?....................................................................................................8
What is the significance of privacy and security in business ? ............................................9
What are the obligations which is link to the privacy and security for business ?................9
Select any two collaboration tools and discuss regarding them in details - ..........................9
How did they assist business while pandemic ? ..................................................................10
Determine capable privacy and security threats business may have to face while
pandemic- .................................................................................................................................10
What steps has been taken to save themselves from these threats -...................................11
what are the measures business can take to prevent or save themselves from these threats ?
...................................................................................................................................................11
CONCLUSION .............................................................................................................................12
REFRENCES.................................................................................................................................12
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

INTRODUCTION
It is very crucial for an individual and organization to have the professionals which
possess technical skills for carry out the different types of business functions in a very effective
manner. The technical skill are basically in regarding to the information technology and
communication skills by which the company management and the individuals complete the task
with high efficiency. Several types of techniques cab be used by the firm to become effective in
the market and improves their sustainability (Jimenez, Jahankhani, and Kendzierskyj, , 2020).
The information and the communication technology may be referred as the process in which
communication within the the organisation is done by utilizing the new as well as latest
technology. The following report is going to cover the different types of topics like collaborative
tools, privacy and security of data that is essential to be maintained and many more. This report
also covers the concept of cloud computing and cloud storage along with the private and public
internet services.
Literature review
Collaboration tools
What are collaboration tools? Give some examples of collaboration tools
The collaboration tools may be referred as the numerous types of new as well as latest
technologies which are used by the management of the business organization to grow into the
market. With the help of this tool the people are able to work collectively and attain the set goals
in a very effective manner. In simple term this may be defined as working with other group of
individual to attain the desire objectives. With the use of this technology the people within the
business organization are able to work with more collaboratively and helps each other to carry
out the task. There are different types of examples such as zoom, go netting, Stack etc.
Where are they used and what are they used for?
In different ways the collaborative tools are utilized to connect with the people. This may
be utilized by the individual for the purpose of scholling, collage and business meetings. With
the help of this, they are able to work in a team in proper manner by which individuals can
effectively understood the view point of each individuals. The zoom meeting is being considered
as one of the most effective example of the collaborative tools which are highly used during the
It is very crucial for an individual and organization to have the professionals which
possess technical skills for carry out the different types of business functions in a very effective
manner. The technical skill are basically in regarding to the information technology and
communication skills by which the company management and the individuals complete the task
with high efficiency. Several types of techniques cab be used by the firm to become effective in
the market and improves their sustainability (Jimenez, Jahankhani, and Kendzierskyj, , 2020).
The information and the communication technology may be referred as the process in which
communication within the the organisation is done by utilizing the new as well as latest
technology. The following report is going to cover the different types of topics like collaborative
tools, privacy and security of data that is essential to be maintained and many more. This report
also covers the concept of cloud computing and cloud storage along with the private and public
internet services.
Literature review
Collaboration tools
What are collaboration tools? Give some examples of collaboration tools
The collaboration tools may be referred as the numerous types of new as well as latest
technologies which are used by the management of the business organization to grow into the
market. With the help of this tool the people are able to work collectively and attain the set goals
in a very effective manner. In simple term this may be defined as working with other group of
individual to attain the desire objectives. With the use of this technology the people within the
business organization are able to work with more collaboratively and helps each other to carry
out the task. There are different types of examples such as zoom, go netting, Stack etc.
Where are they used and what are they used for?
In different ways the collaborative tools are utilized to connect with the people. This may
be utilized by the individual for the purpose of scholling, collage and business meetings. With
the help of this, they are able to work in a team in proper manner by which individuals can
effectively understood the view point of each individuals. The zoom meeting is being considered
as one of the most effective example of the collaborative tools which are highly used during the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

COVID 19 pandemic. The students are able to effectively conduct their studies during the lock
down over the online digital platform (Jin, , and et., al, 2018)
What are advantages and disadvantages of collaboration tools in general?
There are different types of advantages as well as disadvantage which are associated with
the collaborative tools from which some of them mentioned below: -
Advantages
The online collaboration with the different types of tools assist in providing the flexibility
to work in the organisation in a very effective manner. The online collaboration make
able the individual to carry out the task at any time and form any place which make it
mote flexible for them.
This also allow the individual to enhance their productivity which make the them able to
enjoy the competitive advantage.
These tools also assist the management of the business organisation in the project
management which allows them them to manage all the task in a very effective manner.
Disadvantages : -
The disadvantage which is associated with the these tools is that, this increases chances
of delayed responses by the individual which may affect the functioning of the task. The
digital meets are used by the students to take the online classes by which and delayed
response of the students to the teacher result in affecting their studies.
The shift of the individuals towards the digital collaboration may result in feeling
disconnected form each other and form the business organisation. The less casual
penetration within the digital platform result in disconnecting the people with each others
(Li, and Xue,, 2019).
Cloud Storage
What is it ?
The cloud storage is basically a cloud computing tool which are used by the individuals
as well as the organisation in order to store the data over the internet. With the help of this the
huge amount of data can be store as well as manage (Couretas, J.M., 2022.).
What is it used ?
down over the online digital platform (Jin, , and et., al, 2018)
What are advantages and disadvantages of collaboration tools in general?
There are different types of advantages as well as disadvantage which are associated with
the collaborative tools from which some of them mentioned below: -
Advantages
The online collaboration with the different types of tools assist in providing the flexibility
to work in the organisation in a very effective manner. The online collaboration make
able the individual to carry out the task at any time and form any place which make it
mote flexible for them.
This also allow the individual to enhance their productivity which make the them able to
enjoy the competitive advantage.
These tools also assist the management of the business organisation in the project
management which allows them them to manage all the task in a very effective manner.
Disadvantages : -
The disadvantage which is associated with the these tools is that, this increases chances
of delayed responses by the individual which may affect the functioning of the task. The
digital meets are used by the students to take the online classes by which and delayed
response of the students to the teacher result in affecting their studies.
The shift of the individuals towards the digital collaboration may result in feeling
disconnected form each other and form the business organisation. The less casual
penetration within the digital platform result in disconnecting the people with each others
(Li, and Xue,, 2019).
Cloud Storage
What is it ?
The cloud storage is basically a cloud computing tool which are used by the individuals
as well as the organisation in order to store the data over the internet. With the help of this the
huge amount of data can be store as well as manage (Couretas, J.M., 2022.).
What is it used ?

The cloud storage are used by the organisation for the different purpose. Some of the
organisation used this as a warehouse of information, some of them uses to protect as well as
secure the data.
What are the advantages, disadvantage s and suitability and applications of cloud storage?
Advantages
The cloud storage have the option of backing up the data as well as the information if in
case the important data of the individual or the organisation have lost or deleted by
mistake.
Cloud storage remove or eliminate the need of the external hard drives. This allow them
to store huge number of data with full security and from anywhere.
Disadvantages
The biggest disadvantage which is associated with this is that this needed the internet
connection, without this the user not be able to use the cloud computing.
Due to the availability of less security the data may be leak which may be result in
affecting the functioning of the organisation.
Applications
Different types of services are provided by the cloud services in regarding to the storage
of the data. This is being considered as the most secured way for the organisation to become
competitive.
Clout computing
What is it ?
Distributed computing is basically the procedure of delivery management which
comprises of servers, storage information repositories, organization, programming, inspection,
and knowledge over the internet (Christou, , 2019.). This assist the organisation to get the faster
growth, adapt the assets and increases the economies of sales. One of the biggest advantage
which can be enjoy by utilizing the distributed computing management is that they can eliminate
the direct expenses and the problem in buying and maintain its own IT infrastructure and
effectively analyse the pay for what they use. Therefore, the providers of distributed computing
management benefit the organisation to enjoy the economies of scale by providing similar
management to different consumer.
organisation used this as a warehouse of information, some of them uses to protect as well as
secure the data.
What are the advantages, disadvantage s and suitability and applications of cloud storage?
Advantages
The cloud storage have the option of backing up the data as well as the information if in
case the important data of the individual or the organisation have lost or deleted by
mistake.
Cloud storage remove or eliminate the need of the external hard drives. This allow them
to store huge number of data with full security and from anywhere.
Disadvantages
The biggest disadvantage which is associated with this is that this needed the internet
connection, without this the user not be able to use the cloud computing.
Due to the availability of less security the data may be leak which may be result in
affecting the functioning of the organisation.
Applications
Different types of services are provided by the cloud services in regarding to the storage
of the data. This is being considered as the most secured way for the organisation to become
competitive.
Clout computing
What is it ?
Distributed computing is basically the procedure of delivery management which
comprises of servers, storage information repositories, organization, programming, inspection,
and knowledge over the internet (Christou, , 2019.). This assist the organisation to get the faster
growth, adapt the assets and increases the economies of sales. One of the biggest advantage
which can be enjoy by utilizing the distributed computing management is that they can eliminate
the direct expenses and the problem in buying and maintain its own IT infrastructure and
effectively analyse the pay for what they use. Therefore, the providers of distributed computing
management benefit the organisation to enjoy the economies of scale by providing similar
management to different consumer.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

What is it used ?
Developing the framework which help the distributed computing recently accounts for a
huge part of information technology spending and as the procedure move to the cloud
continually whether it is public cloud management which is provided by the merchant or
spending on premises IT slides or the security developed by the effort itself (Carroll, , 2018).
What are the advantages, disadvantages and suitability and applications of cloud
computing ?
Advantages: -
High Speed: - the data which are stored in the cloud can be effectively back up or restore
within in less time.
Programmatic software integration: - programming orchestration is basically a natural
occurrence within the cloud. With the help of application of cloud computing an
individual don't have to go extra mile to modify and coordinate.
Disadvantages: -
Performance Can Vary: -the applications of the individuals are run on the servers when
they are working in a cloud environment. Any unauthorised behaviour or DDOS attack
may result in the affecting the display of common assets.
Security Threat in the Cloud: - this is also the most important disadvantage while
utilizing the distributed computing management. Before embracing into the cloud
computing the individual must have to aware about that, there data will be shared to the
external cooperative of distributed computing experts. This may result in increasing the
chances of data imitation or threat of data(Musembe, and Mutula, , 2021).
TASK
Privacy and security
What is privacy and security ?
It is defined as the management as the control over the personal details which is
shared by a particular business concern . The privacy is link to the ways or the details
which is required to be secured by the company in regards to be impressive and efficient.
This is link to the security of the big data which Is collected by the company . The privacy
Developing the framework which help the distributed computing recently accounts for a
huge part of information technology spending and as the procedure move to the cloud
continually whether it is public cloud management which is provided by the merchant or
spending on premises IT slides or the security developed by the effort itself (Carroll, , 2018).
What are the advantages, disadvantages and suitability and applications of cloud
computing ?
Advantages: -
High Speed: - the data which are stored in the cloud can be effectively back up or restore
within in less time.
Programmatic software integration: - programming orchestration is basically a natural
occurrence within the cloud. With the help of application of cloud computing an
individual don't have to go extra mile to modify and coordinate.
Disadvantages: -
Performance Can Vary: -the applications of the individuals are run on the servers when
they are working in a cloud environment. Any unauthorised behaviour or DDOS attack
may result in the affecting the display of common assets.
Security Threat in the Cloud: - this is also the most important disadvantage while
utilizing the distributed computing management. Before embracing into the cloud
computing the individual must have to aware about that, there data will be shared to the
external cooperative of distributed computing experts. This may result in increasing the
chances of data imitation or threat of data(Musembe, and Mutula, , 2021).
TASK
Privacy and security
What is privacy and security ?
It is defined as the management as the control over the personal details which is
shared by a particular business concern . The privacy is link to the ways or the details
which is required to be secured by the company in regards to be impressive and efficient.
This is link to the security of the big data which Is collected by the company . The privacy
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

is connected to the securing the details in the ethical meeting with the utilsation of the
technology.
What is the significance of privacy and security in business ?
Here is an importance of the privacy and security in business due to the users have a
trust over the business in regards to share their individual details. As well as in connection
of the artificial intelligence and the technology it is much crucial for the business to safe
the details (Campbell,., 2018). The safety of the data assist in making the trust among the
buyers and the company.
What are the obligations which is link to the privacy and security for business ?
Here are different challenges that is faced by an institution that is link to the privacy and
security that is listed in below -
1. Federal privacy regulations - modifications in the governing policies have been
again difficult for managing the isolation and safety of the data for the company.
2. Increasing regulations – the raising security in the system particularly in the british
country union is becoming complex for the organisation. This has effected In the
difficulty for the business in order to raise the data safety.
Analysis and discussion
Collaboration tools
Select any two collaboration tools and discuss regarding them in details -
Here are assorted collaborative tools which is utilised by the different humans while
the covid lock down which is listed in below-
1. go the visualise conference - it is the kind of online stage where the video classes
have been taken by the mentors also it is used by an organisations too in which team
and class can join all together on a online session at a similar time. It is tool which is
most basic tool that is utilised in the covid lock down for taking a class and
meeting also it helps in saving time on this application the meeting is organised on a
particular time by the trainer and mentors. It is the tool in which people can connect
as there are various option of connecting via the internet.
2. Details and communication technology - it has a certain other instruments just as
zoom meeting it is also utilised by the people in their businesses can run the
technology.
What is the significance of privacy and security in business ?
Here is an importance of the privacy and security in business due to the users have a
trust over the business in regards to share their individual details. As well as in connection
of the artificial intelligence and the technology it is much crucial for the business to safe
the details (Campbell,., 2018). The safety of the data assist in making the trust among the
buyers and the company.
What are the obligations which is link to the privacy and security for business ?
Here are different challenges that is faced by an institution that is link to the privacy and
security that is listed in below -
1. Federal privacy regulations - modifications in the governing policies have been
again difficult for managing the isolation and safety of the data for the company.
2. Increasing regulations – the raising security in the system particularly in the british
country union is becoming complex for the organisation. This has effected In the
difficulty for the business in order to raise the data safety.
Analysis and discussion
Collaboration tools
Select any two collaboration tools and discuss regarding them in details -
Here are assorted collaborative tools which is utilised by the different humans while
the covid lock down which is listed in below-
1. go the visualise conference - it is the kind of online stage where the video classes
have been taken by the mentors also it is used by an organisations too in which team
and class can join all together on a online session at a similar time. It is tool which is
most basic tool that is utilised in the covid lock down for taking a class and
meeting also it helps in saving time on this application the meeting is organised on a
particular time by the trainer and mentors. It is the tool in which people can connect
as there are various option of connecting via the internet.
2. Details and communication technology - it has a certain other instruments just as
zoom meeting it is also utilised by the people in their businesses can run the

business activity . It is the kind of an instrument where the number of people can
relate to every one. The visual conference is needed in the company to connect with
the included in regards to make conversation in the effective and efficient ways.
How did they assist business while pandemic ?
Usage of the different tool have assisted the company while the pandemic. As
instance the pandemic the company have faced huge losses due to the unavailability of the
human workforce. The people were not able to collect altogether in a team this has effected
with in the business. But the digital platform just as the zoom meeting slack which have aid
an individuals to relate each other and action the project over the internet services.
Utilization of the web line and the stage just as zoom meeting have assisted the people in
regards to conduct the conference and discussion the operations over the meeting with the
team . This have assisted a lot for an organization while the academic as the people were
not permitted to move out of the box and continuing the operations via the content and
calls have aid in running business constantly. It have been also assisted in supporting
workers giving the facility of work from home that has raised in certain platforms has
given with the various opportunity to the people in order to add the competitive benefits.
Privacy and security while pandemic -
Determine capable privacy and security threats business may have to face while pandemic-
Here are some capable privacy and security threats which is faced by the business during
pandemic are listed in below -
1. Cyber attack - it is the one of the huge threat that is seem by the company due to the
covid effects they had to go through a huge loss in business income. They also have
moved to the online platform as there was the huge details which is stored by the
company for the rivalry benefits . The company have a huge risk of the different
threat which is linked to the cyber security of the details which is collected by the
company. Utilisation of the digital stages includes the uncertainity of the
management where business arr not capable to balance the operations.
2. Hacking – It is the other risk which has faced by the company after the covid as the
business has the various system that are connected with each other and the usage of
the various servers have lead to the details of the company. This can tends to the
big loss for an enterprise. The utilisation of the digital stages tends to the breakage of
relate to every one. The visual conference is needed in the company to connect with
the included in regards to make conversation in the effective and efficient ways.
How did they assist business while pandemic ?
Usage of the different tool have assisted the company while the pandemic. As
instance the pandemic the company have faced huge losses due to the unavailability of the
human workforce. The people were not able to collect altogether in a team this has effected
with in the business. But the digital platform just as the zoom meeting slack which have aid
an individuals to relate each other and action the project over the internet services.
Utilization of the web line and the stage just as zoom meeting have assisted the people in
regards to conduct the conference and discussion the operations over the meeting with the
team . This have assisted a lot for an organization while the academic as the people were
not permitted to move out of the box and continuing the operations via the content and
calls have aid in running business constantly. It have been also assisted in supporting
workers giving the facility of work from home that has raised in certain platforms has
given with the various opportunity to the people in order to add the competitive benefits.
Privacy and security while pandemic -
Determine capable privacy and security threats business may have to face while pandemic-
Here are some capable privacy and security threats which is faced by the business during
pandemic are listed in below -
1. Cyber attack - it is the one of the huge threat that is seem by the company due to the
covid effects they had to go through a huge loss in business income. They also have
moved to the online platform as there was the huge details which is stored by the
company for the rivalry benefits . The company have a huge risk of the different
threat which is linked to the cyber security of the details which is collected by the
company. Utilisation of the digital stages includes the uncertainity of the
management where business arr not capable to balance the operations.
2. Hacking – It is the other risk which has faced by the company after the covid as the
business has the various system that are connected with each other and the usage of
the various servers have lead to the details of the company. This can tends to the
big loss for an enterprise. The utilisation of the digital stages tends to the breakage of
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

the content which is shared over the involvement and this can tend to the loss for
the business cycle.
What steps has been taken to save themselves from these threats -
There are various steps and software that helps in securing the data and personal
details of an organisation all are listed in below -
1. setting a strong password - it is very crucial for the company to concentrate on mange
the strong pass code so that they can save themselves from the different threats .
This will assist the company in manage the heavy passcode where there are loss
chances of the hacking of the passwords of the company system in which the details
is been saved .
2. Antivirus - it is the kind of software which is required to be creating with in the
computer system by the business in regards to assessment their system from the
hacking. It is the one of the major basic tool it is utilised by the company in order to
save their data and the details in which the person can't take the secured data . It
must be implemented by the company from saving with the various hackers.
Private versus public internet -
what are the measures business can take to prevent or save themselves from these threats ?
It has two kinds of internet services in which the public internet services in which the
public internet is explained as the services where it could be utilised by the anyone and
the people can connect to the internet lines . the private network is limited and has
password which is restricted and utilised by the limited amount of people. For instance, the
company have a private network which could be only utilised by the workers. This assist in
maintain the privacy and security of the making it is utilised with in the business. It is very
crucial for the business to take the private network in regards to run the activity with in
the organisation. The personal web line meant that the utilisation of the software or the
cyberspace services is within the business company. In regards to save from the threats of
the exterior network for the company to manage privacy by utilising the private network for
the organisation. This assist the company in regards to hold the details with themselves and
conduct in a systematic manner (Ad’ha Aljunied, , 2020).
the business cycle.
What steps has been taken to save themselves from these threats -
There are various steps and software that helps in securing the data and personal
details of an organisation all are listed in below -
1. setting a strong password - it is very crucial for the company to concentrate on mange
the strong pass code so that they can save themselves from the different threats .
This will assist the company in manage the heavy passcode where there are loss
chances of the hacking of the passwords of the company system in which the details
is been saved .
2. Antivirus - it is the kind of software which is required to be creating with in the
computer system by the business in regards to assessment their system from the
hacking. It is the one of the major basic tool it is utilised by the company in order to
save their data and the details in which the person can't take the secured data . It
must be implemented by the company from saving with the various hackers.
Private versus public internet -
what are the measures business can take to prevent or save themselves from these threats ?
It has two kinds of internet services in which the public internet services in which the
public internet is explained as the services where it could be utilised by the anyone and
the people can connect to the internet lines . the private network is limited and has
password which is restricted and utilised by the limited amount of people. For instance, the
company have a private network which could be only utilised by the workers. This assist in
maintain the privacy and security of the making it is utilised with in the business. It is very
crucial for the business to take the private network in regards to run the activity with in
the organisation. The personal web line meant that the utilisation of the software or the
cyberspace services is within the business company. In regards to save from the threats of
the exterior network for the company to manage privacy by utilising the private network for
the organisation. This assist the company in regards to hold the details with themselves and
conduct in a systematic manner (Ad’ha Aljunied, , 2020).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CONCLUSION
It is concluded from above report that the details and communicational technology
plays a major role in the functioning of the business in the effective manner. The different
manner in which the organisation needs to develop and utilisation the digital platform in
regards to raise the productivity of an institution. Here are different collaboration instruments
which after the pandemic and has advantages the organisational in various ways. It is very
crucial for the company to have the privacy and safety of the data that have been executed
with the aim of securing data.
REFRENCES
Ad’ha Aljunied, S.M., 2020. The securitization of cyberspace governance in Singapore. Asian
Security, 16(3), pp.343-362.
Campbell, P., 2018. Generals in cyberspace: Military insights for defending cyberspace. Orbis,
62(2), pp.262-277.
Carroll, J., 2018, June. Offensive and Defensive Cyberspace Operations Training: Are we There
yet?. In European Conference on Cyber Warfare and Security (pp. 77-86). Academic
Conferences International Limited.
Christou, G., 2019. The collective securitisation of cyberspace in the European Union. West
European Politics, 42(2), pp.278-301.
Couretas, J.M., 2022. Cyberspace Analysis and Targeting Conclusions. In An Introduction to
Cyber Analysis and Targeting (pp. 279-283). Springer, Cham.
Jimenez, J.I., Jahankhani, H. and Kendzierskyj, S., 2020. Health care in the cyberspace: Medical
cyber-physical system and digital twin challenges. In Digital twin technologies and
smart cities (pp. 79-92). Springer, Cham.
Jin, X., and et., al, 2018, May. An adaptive analysis framework for correlating cyber-security-
related data. In 2018 IEEE 32nd International Conference on Advanced Information
Networking and Applications (AINA) (pp. 915-919). IEEE.
Li, J. and Xue, Z., 2019, May. Distributed threat intelligence sharing system: a new sight of P2P
botnet detection. In 2019 2nd International Conference on Computer Applications &
Information Security (ICCAIS) (pp. 1-6). IEEE.
Musembe, C.N. and Mutula, S.M., 2021. Cyberspace Security Threats and Attacks on E-Records
Management at Moi University, Eldoret, Kenya. In Handbook of Research on Records
and Information Management Strategies for Enhanced Knowledge Coordination (pp.
333-353). IGI Global.
Poznansky, M. and Perkoski, E., 2018. Rethinking secrecy in cyberspace: The politics of
voluntary attribution. Journal of Global Security Studies, 3(4), pp.402-416.
Rosenberger, L., 2020. Making cyberspace safe for democracy: The new landscape of
information competition. Foreign Aff., 99, p.146.
It is concluded from above report that the details and communicational technology
plays a major role in the functioning of the business in the effective manner. The different
manner in which the organisation needs to develop and utilisation the digital platform in
regards to raise the productivity of an institution. Here are different collaboration instruments
which after the pandemic and has advantages the organisational in various ways. It is very
crucial for the company to have the privacy and safety of the data that have been executed
with the aim of securing data.
REFRENCES
Ad’ha Aljunied, S.M., 2020. The securitization of cyberspace governance in Singapore. Asian
Security, 16(3), pp.343-362.
Campbell, P., 2018. Generals in cyberspace: Military insights for defending cyberspace. Orbis,
62(2), pp.262-277.
Carroll, J., 2018, June. Offensive and Defensive Cyberspace Operations Training: Are we There
yet?. In European Conference on Cyber Warfare and Security (pp. 77-86). Academic
Conferences International Limited.
Christou, G., 2019. The collective securitisation of cyberspace in the European Union. West
European Politics, 42(2), pp.278-301.
Couretas, J.M., 2022. Cyberspace Analysis and Targeting Conclusions. In An Introduction to
Cyber Analysis and Targeting (pp. 279-283). Springer, Cham.
Jimenez, J.I., Jahankhani, H. and Kendzierskyj, S., 2020. Health care in the cyberspace: Medical
cyber-physical system and digital twin challenges. In Digital twin technologies and
smart cities (pp. 79-92). Springer, Cham.
Jin, X., and et., al, 2018, May. An adaptive analysis framework for correlating cyber-security-
related data. In 2018 IEEE 32nd International Conference on Advanced Information
Networking and Applications (AINA) (pp. 915-919). IEEE.
Li, J. and Xue, Z., 2019, May. Distributed threat intelligence sharing system: a new sight of P2P
botnet detection. In 2019 2nd International Conference on Computer Applications &
Information Security (ICCAIS) (pp. 1-6). IEEE.
Musembe, C.N. and Mutula, S.M., 2021. Cyberspace Security Threats and Attacks on E-Records
Management at Moi University, Eldoret, Kenya. In Handbook of Research on Records
and Information Management Strategies for Enhanced Knowledge Coordination (pp.
333-353). IGI Global.
Poznansky, M. and Perkoski, E., 2018. Rethinking secrecy in cyberspace: The politics of
voluntary attribution. Journal of Global Security Studies, 3(4), pp.402-416.
Rosenberger, L., 2020. Making cyberspace safe for democracy: The new landscape of
information competition. Foreign Aff., 99, p.146.

Saxena, A., 2022. The near future of international law in cyberspace: Contentions and realities.
Weiss, M. and Jankauskas, V., 2019. Securing cyberspace: How states design governance
arrangements. Governance, 32(2), pp.259-275.
Weiss, M. and Jankauskas, V., 2019. Securing cyberspace: How states design governance
arrangements. Governance, 32(2), pp.259-275.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.