Exploring Integrated Professional Skills in the Modern Digital Age

Verified

Added on  2023/06/07

|11
|3901
|86
Report
AI Summary
This report provides a comprehensive overview of integrated professional skills essential for success in the digital age. It begins by examining the importance of project collaboration tools, particularly during the pandemic, highlighting the advantages and disadvantages of tools like Zoom and Google Hangouts. The report then delves into digital technologies such as cloud storage and cloud computing, discussing their benefits, drawbacks, suitability, and applications for businesses. A significant portion is dedicated to data privacy, emphasizing its importance and the challenges associated with maintaining data security. Finally, the report touches on the topic of cryptocurrency, briefly addressing the question of whether it represents a financial bubble. This document is available on Desklib, a platform offering a wide range of academic resources for students.
Document Page
Integrated Professional
Skills in Digital Age
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Contents...........................................................................................................................................2
INTRODUCTION 100....................................................................................................................1
MAIN BODY..................................................................................................................................1
TASK 1............................................................................................................................................1
TASK 2............................................................................................................................................3
TASK 3............................................................................................................................................6
TASK 4............................................................................................................................................7
CONCLUSION................................................................................................................................8
REFERENCES................................................................................................................................9
Document Page
INTRODUCTION
Professional skills can be described as skills related to competencies and abilities of a person that
can be used at the workplace and create different benefits of the jobs. These skills consist of both
hard skills as well as soft skills for a person (Hyman, O'Toole and Will, 2022). There is more
requirement of these skills in the digital age as it allows people to manage their business based
on digital technology. This project report includes an explanation of collaboration tools and its
importance in the business during the period of the pandemic. It explains the advantages,
disadvantages, suitability and application of cloud storage and cloud computing. It also explains
challenges and measure occur related to data security and privacy. Moreover, it justifies whether
cryptocurrency is a bubble bursting.
MAIN BODY
TASK 1
Project collaboration tool can be described as features that helps to ensure open communication
for the project manager, stakeholders and team members included in a project. It can be attained
by a person on different ways of work. There are different team members in a project which
helps the business for purpose of completing a project and for this, the business needs to ensure
among them. There are some teams that prefer face-to-face meetings whereas some are instant
messaging (Hilger and Wahl, 2022). All of these are used by businesses in order to provide
regular updates and status of work related to the project. In order to manage the project in an
effective manner, businesses are using different types of software that help with open
communication.
This collaboration becomes more important for business during the time of pandemic as
during this time, businesses are operating remotely. In this, the whole team of business is
working from their home and the business needs to manage their work. The use of collaboration
tools in this period helps managers to know the progress of the project. On basis of it, project
managers are able to complete the project on time. On basis of it, businesses can find any types
of information quickly and also communicate it with others for the attainment of goals. On basis
of it, businesses can keep the information of stakeholders and also make important decisions of
the business. On basis of it, business is tracking information of individuals and teams for purpose
1
Document Page
of analysation of progress. Explanation of these tools of project collaboration which is used by
the business during the pandemic are mentioned below:
Zoom: It is one of the applications which can be used by business professionals in all over the
world. It is an application that gets appreciation in the work by business as it allows project
managers to use audio and video with high transfer rate, higher quality and also instance sharing
tools (Oostervink and van den Hooff, 2021). It is one of the applications which assists enterprises
for purpose of minimising the cost of the enterprise and also it assists to bundle up different
functions in one screen. It provides HD view, cloud services, patterner integration and other
features.
It is a collaboration tool that is used by businesses during the pandemic situation. It provides
opportunity to people to connect to each other even during the period of the pandemic. It is one
of the app that enables the project team to work with collaboration even from distance. It is
important for those people to exchange work-related information and problem to be faced by
them. It also helps the project manager to solve problems of the project team and also provide
them with detail about new strategies related to work. On basis of this app, project managers can
take updates through audio and video.
Advantage
It is one of the applications which is easy to use and provide the solution to video
conferencing problem.
It allows different people to connect for virtual meeting through desktop, mobile devices
and mobile.
It is a budget-friendly application as it is offering different features free for use of
different people. It is charging some fee for purpose of using additional features.
Disadvantage
There are security issues to occur in the Zoom application as any person by clicking on
the link can enter into the zoom meeting.
It is a company that delayed for customer service as it requires around 2 to 3 days for
purpose of finding out a solution to a problem.
Hangouts: Google hangout is one of the project collaborations tools which can be used by the
project manager in order to manage the project (Dai and et. al., 2020). It is an application that is
like other instant messaging applications. It is an application that can be used by the project team
2
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
in the background and they can get a notification with the arrival of any message. The use of this
application in the background and allows to synchronized messages of all the devices. It is an
application that has different features like voice calls video calls and others. The use of this
application also allows team members to send voice mails to each other.
It is an application that is used by businesses during the period of pandemics. It is an
application on basis of which project managers are able to share quick information with different
team members. On basis of it, it is easier for the project manager to complete tasks by ensuring
information sharing among different members.
Advantage:
It is a tool that can be connected with different types of OS as it does not only connect to
android devices but can also be compatible with Windows and iOS.
It is an application that can add up to 10 members in one call. It is one of the best tools
for purpose of video calling that is free for both Android and iOS.
It is a tool that synchronised conversation on different devices automatically and due to
this, there is no risk of losing conversation details.
Disadvantage:
It is an application which requires a google account in order to run. If a person does not
have a google account, they are unable to use this application.
It does not provide features of tracking of the message to a person.
It also does not show online and offline status to a different person.
TASK 2
In this digital era, digital technologies are essential for businesses in order to get success. It is
important for businesses to use these digital technologies in order to better understand the
requirements of consumers, align these requirements with the offering of business and also to
offer products on a platform where the consumer can reach to them (Anuradha and et. al., 2021).
These digital technologies in business include cloud computing, cloud storage and e-commerce
and others.
Cloud storage:
It is a model related to cloud computing that stores data in the interest of the cloud computing
provider that manages as well as operate data storage services. It provides these services on basis
of demand, cost and capability and also eliminates the need for buying as well as manage own
3
Document Page
data storage infrastructure. It is a technology that offers agility, durability as well as global scale
at any time, any where through data access.
Advantage:
Cloud storage is one of the services which is providing a cost advantage to a person as
they do not need to purchase hardware and capital. A person can add and remove the
capacity of cloud storage quickly on basis of their demand (Sunyaev, 2020).
Cloud storage is one of the services that provide quick storage to a company when
require.
Using of cloud storage policy allow the business to perform the different task of
information management.
Disadvantage:
It is a service that is dependent on the internet connection and if a person does not have
an effective connection of the internet that it results in the issue of storage.
There is also an additional cost for companies to upload and download files which can
result in increased costs for the company.
There is the risk related to privacy for using the cloud storage facilities as it is no longer
saved in physical storage.
Suitability:
It can be suitable for a business that is operating at a small level and does not have enough funds
for the development of infrastructure to ensure effective storage of data of the company.
Application:
It is a service that can be purchased by the third-party cloud vendor who owns as well as operate
data storage capacity and also delivers it throughout the internet. It is a service that manages
security, durability as well as capability to make the data of the company visible to their
application from different parts of the world (Yang and et. al., 2018). It can be applied through
traditional storage protocols or by API. There are different vendors who are offering
complimentary services to different people in order to manage, secure, analyse and collect the
data at the large scale.
Cloud computing:
It is a digital technology that ensures the delivery of computing services like server, networking,
storage, intelligence, database, software and analytics through the internet in order to ensure
4
Document Page
innovation, economies of scale and also with flexible resources. In this, business needs to pay
only for the services they are using and therefore, it requires the lower cost of operation and also
helps to run the infrastructure in a more effective and efficient manner. It helps to measure the
needs of businesses for purpose of change.
Advantage
It is important software that helps businesses for purpose of reducing the cost of the
company as a business it does not require any hardware or infrastructure. It also saves the
cost of racks of different servers, cooling, electricity and other tools (Khayer and et. al.,
2020).
It will provide service in a faster manner as a person can access to these services in few
minutes.
It provides delivery of these services at anywhere and all the things businesses require is
having proper storage.
Disadvantage
There is the threat of cyber stack in this service as the third party can get access to data of
the company through hacking and other nonlegal activities.
There is downtime in these services as due to slow access of the internet, it becomes
difficult to use the service (Bertino and Ferrari, 2018).
These are the services that can be owned, monitored and managed by a person by service
provider.
Suitability
It is one of digital technology that is suitable for businesses that ensure data protection and also
helps them to access to space. The suitability of cloud computing can be dependent of the type
and nature of business.
Application
These are the cloud computing services that can be used for purpose of getting access to
information of clients, employees and support related to the product strategies of the company. It
provides different cost advantage and also provides economies of scale to business.
TASK 3
Data privacy can be described as the protection of personal data of a person from other who do
not have access to it and also it describes as the ability of a person to determine who does not
5
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
have access to their personal information. It provides the ability to a person in order to determine
themselves as to what extent a person can share their personal information and also communicate
it to others (Zhang, Alazab and Muthu, 2021). This type of personal information is related to
location, name of the person, contact information and behaviour of a person. It is important for a
person in order to protect their personal information from defrauding and harassed. It is also
important in order to protect personal data from access to outsiders as they can sell this
information from unwanted marketing and advertising.
Data security on the other hand is described as concerned of a person related to protection of data
of a person from unauthorised access. There are different types of tools that can be used by a
person in order to protect their data. It ensures accuracy and integrity of data, availability and
reliability of data from third party access. For this, different methods can be used by a person
which includes a branch response, network security, multi factor authentication, access control,
encryption and others.
Challenges
There are different types of challenges to be faced by a person related to data privacy and
security. It is important for businesses to deal with challenges in order to protect their business
from third party to access their data. Some of these challenges in business related to data security
and privacy are mentioned below:
Increasing use of technology in business results in an increasing threat to data privacy and
security. In order to overcome these threats, business needs to adopt effective infrastructure
which assists them to protect the data of the company from third-party access. In this, business
needs to make their system more secure which is essential in order to provide success for the
business as a security threat can create a negative impact on the image of the company. In order
to ensure this safety, the cost of the company has increased (Kumar and Goyal, 2019). It creates
a threat for business and also it provides the advantage to competitors of information of
competitors related to business.
Data privacy and security also create issues for businesses by proliferating devices in
business. It is important for business to protect their system from the devices of others. This
threat becomes more serious due to the policy of the company of bringing your own devices, use
of the internet, proliferating interconnected devices and others. Increasing dependence on one
device also makes these issues more challenging for businesses.
6
Document Page
Another threat to data privacy and security is data loss. In today’s time, there is an increasing
dependence of business on digital technology. Businesses require technology for different
purposes and if this technology fails, then the operation of the business has also stopped
(Sharghivand and Derakhshan, 2021). Technology error can occur in business that creates a
negative impact on the operation of business.
Data hacking is another threat for purpose of data privacy and security of the business.
There are different types of hackers are there in business that ensure unauthorised access to the
data of the company. It will create an impact on the performance of the business. It is important
for businesses to ensure the installation of different systems which helps them to protect
important information of a business from hackers.
Measures to prevent data privacy and security challenges
Openness with users: It is important for businesses to ensure openness with users for purpose of
sharing data. It is important for them in order to provide information to consumers about which
types of their data are used by companies. It is also important for them in order to respect their
privacy in business and also allow them to have different options o modify their users.
Minimise data collection: It is also important for a business to minimize data collection in
business. It is important for them in order to overcome challenges that occur in business. For
this, they only need to collect essential information from their employees as well as consumers.
It will decrease the threat to privacy and security.
Inventory data: It is also a measure in which business needs to ensure that they are dealing with
the data in the right manner. They also need to scan the data in an effective manner and also to
keep it safe at right place.
TASK 4
Tether is the largest bank that get in stable condition as withdrawals reflect that company is
effectively dealing with different slow motion bank that allows depositors to move their cash on
a regular stable coins (Ji and et. al., 2022). There are different reasons on basis of which it can be
analysed that cryptocurrency is the bubble bursting. Explanation of some of the reason are
mentioned below:
There is minimal utility in the real world which is considered as drawback for purpose of digital
currency as it seems useless outside the currency exchange. There are only a small number of
high-profile companies are there who seen accepting Bitcoins (Kyriazis, Papadamou and Corbet,
7
Document Page
2020). There are around 1300 businesses are there that accept the dogecoin whereas 15174
businesses are accepting Bitcoins in the end of December 2020. There is an estimation of around
582 million of entrepreneurs in all over the world and among which only a small number of
companies are accepting these coins.
\Business is slow for purpose of adopting blockchains in the marketplace. Blockchains in the
context of the paper are a good decision of the company. It is one of the financial sides which
reflect settlement and validation of the payment. Instead of waiting around a week for purpose of
settling of cross-border payment, a person can resolve the issues in a minute and seconds.
Blockchain has a non-financial application (Yao and Li, 2021). The smart blockchain of
Ethereum can be considered as key to unlocking the supply of bottlenecks. It can be a success on
paper but it the real world, it does not get success.
Virtually, there is no barrier to entry in crypto. Any person who has time for the code can be able
to develop tethered tokens as well as blockchain. As per CoinMarketCap, there are around 1000
different cryptocurrencies there in the system. There are many people who are not trading much
in this, but if people are trading, there are a number of potential competitors for Bitcoin,
Ethereum, Dogecoin and others.
CONCLUSION
From above mentioned project report, it can be concluded that professional skills are required by
a person in the digital age in order to manage the business in an effective manner. There are
different digital tools that can be used by businesses in order to manage the business remotely.
There are different digital technology that assists businesses to improve their service like cloud
storage and computing.
8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journals
Anuradha, M., and et. al., 2021. IoT enabled cancer prediction system to enhance the
authentication and security using cloud computing. Microprocessors and
Microsystems, 80, p.103301.
Bertino, E. and Ferrari, E., 2018. Big data security and privacy. In A comprehensive guide
through the Italian database research over the last 25 years (pp. 425-439). Springer,
Cham.
Dai, X., and et. al., 2020. Correlation between process openness and collaboration tool usage in
open source hardware design: an empirical study. International Journal on Interactive
Design and Manufacturing (IJIDeM), 14(2), pp.481-489.
Hilger, J. and Wahl, Z., 2022. Collaboration Suites. In Making Knowledge Management
Clickable (pp. 147-154). Springer, Cham.
Hyman, H., O'Toole, I. and Will, R., 2022. " Slacking" for Success: A Post-COVID-19
Approach for Increasing Student Engagement beyond the Physical Classroom, Using
Collaboration Tools with Team-Based and Project-Based Learning. Ubiquitous
Learning: An International Journal, 15(1).
Ji, Q., and et. al., 2022. Cryptocurrency Bubble on the Systemic Risk in Global Energy
Companies. The Energy Journal, 43(Special issue).
Khayer, A., and et. al., 2020. Cloud computing adoption and its impact on SMEs’ performance
for cloud supported operations: A dual-stage analytical approach. Technology in
Society, 60, p.101225.
Kumar, R. and Goyal, R., 2019. Assurance of data security and privacy in the cloud: A three-
dimensional perspective. Software Quality Professional, 21(2), pp.7-26.
Kyriazis, N., Papadamou, S. and Corbet, S., 2020. A systematic review of the bubble dynamics
of cryptocurrency prices. Research in International Business and Finance, 54,
p.101254.
Oostervink, N. and van den Hooff, B., 2021. Making collaboration tools work at work:
Navigating four major implementation dilemmas. Journal of Financial
Transformation, 52, pp.76-85.
Sharghivand, N. and Derakhshan, F., 2021. Data Security and Privacy in Industrial IoT. In AI-
Enabled Threat Detection and Security Analysis for Industrial IoT (pp. 21-39).
Springer, Cham.
Sunyaev, A., 2020. Cloud computing. In Internet computing (pp. 195-236). Springer, Cham.
Yang, Y., and et. al., 2018. Efficient traceable authorization search system for secure cloud
storage. IEEE Transactions on Cloud Computing, 8(3), pp.819-832.
Yao, C.Z. and Li, H.Y., 2021. A study on the bursting point of Bitcoin based on the BSADF and
LPPLS methods. The North American Journal of Economics and Finance, 55,
p.101280.
Zhang, Y.J., Alazab, M. and Muthu, B., 2021. Machine Learning-Based Holistic Privacy
Decentralized Framework for Big Data Security and Privacy in Smart City. Arabian
Journal for Science and Engineering, pp.1-11.
9
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]