COM0006NFBNM: Technology in Organizations Project - Arden University
VerifiedAdded on 2022/11/30
|13
|3746
|316
Project
AI Summary
This assignment analyzes the role of technology in organizations, specifically focusing on Arden University as a case study. It begins by defining Big Data, detailing its six Vs (Veracity, Variety, Value, Velocity, Variability, and Volume), and explaining its role within the university, particularly in the exa...

Technology in
Organization
Organization
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
INTRODUCTION.......................................................................................................................................3
QUESTION 1..............................................................................................................................................3
Discussion on Big Data and its role in Arden University........................................................................3
Discussion of benefits of adopting Big Data that is gained by Arden University....................................4
QUESTION 2..............................................................................................................................................5
Explanation of Information and technology security and measures of data privacy which companies can
implement together with provisions of GDPR.........................................................................................5
QUESTION 3..............................................................................................................................................8
What is cellular network, its principles components and how does it works...........................................8
Benefits of cellular network to the business............................................................................................9
CONCLUSION.........................................................................................................................................12
REFERENCES..........................................................................................................................................13
INTRODUCTION.......................................................................................................................................3
QUESTION 1..............................................................................................................................................3
Discussion on Big Data and its role in Arden University........................................................................3
Discussion of benefits of adopting Big Data that is gained by Arden University....................................4
QUESTION 2..............................................................................................................................................5
Explanation of Information and technology security and measures of data privacy which companies can
implement together with provisions of GDPR.........................................................................................5
QUESTION 3..............................................................................................................................................8
What is cellular network, its principles components and how does it works...........................................8
Benefits of cellular network to the business............................................................................................9
CONCLUSION.........................................................................................................................................12
REFERENCES..........................................................................................................................................13

INTRODUCTION
Technology is considered as an essential component in the world of businesses as it helps
in making the work and interaction quicker and easier with the information being available. The
information system comprises of the process which involves collection, recording and of course
storing of data with the help of which the data can be abided. The technological advancement
which is done in the world is aimed for the invention so that such offering is made which can on
side satisfy the wants and needs of the consumers and on the other, it helps in confidential
framing of financial data so that competitive advantage can be taken (Howell, van Beers and
Doorn, 2018). The company chosen for this report is Arden University. This report shall cover
about big data and its advantages, data privacy and the IT security measures which may be
implemented by organizations. Further it is cover about cellular network, its principles and
advantages attached to it.
QUESTION 1
Discussion on Big Data and its role in Arden University.
Big data is referred to as the group of information which covers the exponentially grown
numerical that are maintained for the specific time period. It is big in size and supports in
management of complex data by the tools and processes in order to ensure efficient working.
There are three types of the Big Data which involves unstructured, structured and semi
structured. It basically helps in making the effective decisions for businesses and also contribute
in the maintenance of new opportunities so that the organization can get the advancement. The
main role of Big data is collecting and storing the important data and information (Wang and
Wang, 2020). Arden University makes use of this data so that it can confidently keep the track of
all essential information. It basically helps in protecting the Arden University’s information and
also allows access to information that relates to the students and staff of the university.
6Vs of big data
The big data consists of the six characteristics which are narrated below-
Technology is considered as an essential component in the world of businesses as it helps
in making the work and interaction quicker and easier with the information being available. The
information system comprises of the process which involves collection, recording and of course
storing of data with the help of which the data can be abided. The technological advancement
which is done in the world is aimed for the invention so that such offering is made which can on
side satisfy the wants and needs of the consumers and on the other, it helps in confidential
framing of financial data so that competitive advantage can be taken (Howell, van Beers and
Doorn, 2018). The company chosen for this report is Arden University. This report shall cover
about big data and its advantages, data privacy and the IT security measures which may be
implemented by organizations. Further it is cover about cellular network, its principles and
advantages attached to it.
QUESTION 1
Discussion on Big Data and its role in Arden University.
Big data is referred to as the group of information which covers the exponentially grown
numerical that are maintained for the specific time period. It is big in size and supports in
management of complex data by the tools and processes in order to ensure efficient working.
There are three types of the Big Data which involves unstructured, structured and semi
structured. It basically helps in making the effective decisions for businesses and also contribute
in the maintenance of new opportunities so that the organization can get the advancement. The
main role of Big data is collecting and storing the important data and information (Wang and
Wang, 2020). Arden University makes use of this data so that it can confidently keep the track of
all essential information. It basically helps in protecting the Arden University’s information and
also allows access to information that relates to the students and staff of the university.
6Vs of big data
The big data consists of the six characteristics which are narrated below-
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Veracity- It generally gives quality of data with the support of which the uncontrollable
environment and unreliable information source can be made.
Variety- It provides that all the source of data is in the form of unstructured so that
heterogeneous taxonomies and frequency is maintained.
Value- It states longitudinal studies regarding all information data that is relevant so that
the accurate information and data is collected.
Velocity- This is aimed for analyzing the high speed processor with the eight seasons that
is taken in the quicker manner so that increased frequency is generated of the data about
health and infrastructure.
Variability- It provides that the essential health effect and evolution of the illness and
health of many of the diseases together with its evolution. These types of data mainly
help in maintenance of the information regarding seasonal health issues.
Volume- It helps in monitoring on the important signs and high advancement in the
technology (Gregory and Halff, 2020).
Role of Big data
This data is generally used in sectors that involves banking, education, governmental
areas and insurance. Arden University makes use of the Big data so that it keep proper track of
all the data and information like record of new and existing students so that these are kept
appropriately and may be attained at any time. In Arden university, the role of the Big data is
illustrated below-
Examination department- The aim of Big data in this unit is to keep record of every
student and its performance in every academic session. It also keeps the record of their
scores so that appropriate data is maintained.
Administration department- This unit keeps the record of every student so the main role
of Big data is to maintain such records of new and existing students so that appropriate
record is maintained (He, Wang and Akula, 2017).
environment and unreliable information source can be made.
Variety- It provides that all the source of data is in the form of unstructured so that
heterogeneous taxonomies and frequency is maintained.
Value- It states longitudinal studies regarding all information data that is relevant so that
the accurate information and data is collected.
Velocity- This is aimed for analyzing the high speed processor with the eight seasons that
is taken in the quicker manner so that increased frequency is generated of the data about
health and infrastructure.
Variability- It provides that the essential health effect and evolution of the illness and
health of many of the diseases together with its evolution. These types of data mainly
help in maintenance of the information regarding seasonal health issues.
Volume- It helps in monitoring on the important signs and high advancement in the
technology (Gregory and Halff, 2020).
Role of Big data
This data is generally used in sectors that involves banking, education, governmental
areas and insurance. Arden University makes use of the Big data so that it keep proper track of
all the data and information like record of new and existing students so that these are kept
appropriately and may be attained at any time. In Arden university, the role of the Big data is
illustrated below-
Examination department- The aim of Big data in this unit is to keep record of every
student and its performance in every academic session. It also keeps the record of their
scores so that appropriate data is maintained.
Administration department- This unit keeps the record of every student so the main role
of Big data is to maintain such records of new and existing students so that appropriate
record is maintained (He, Wang and Akula, 2017).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Discussion of benefits of adopting Big Data that is gained by Arden University.
There are various merits attached with use of the big data which is enjoyed by the
companies and firm when they all adopt the Big data in their functions. In relation to the Arden
University, the advantages are discussed below-
Analyzing the potential risk- The Big Data is designed with the aim to identify the
problems and risk together with its solution through the risk management which helps in
working of the companies. Arden University makes use of the Big data that helps in
generating awareness of the risk factors so that the university can get prepared of the risk
in advance.
Improvising the retention of the customers- The main function of big data which helps
the businesses is that it helps in keeping he record of every customer in their preference
together with its needs and rights by maintaining its choice. It mainly helps in analyzation
of demand, requirement and needs of the customers. Arden University also uses big data
in order to identify the demand and need of students regarding what course they require
and then try to introduce it.
Innovation in the offering- Big data is aimed to maintain the new technique and idea of
innovation so that large number of customers is attracted and brand value is retained by
upgrading the system. Arden University makes use of this big data that helps in
protecting the services by optimum quality and method (Quboa and Mehandjiev, 2017).
QUESTION 2
Explanation of Information and technology security and measures of data privacy which
companies can implement together with provisions of GDPR.
Information and technology security is a strategic cyber security that helps in preventing
the unauthorized access in business as it deals with computer network and data. It mainly
supports in the maintenance of the relevant and confidential information and also block
information from the axis of the hackers. IT security helps in maintaining the integrity through
which all the relevant information stored in data is kept safe and secure from the unauthorized
access. These types of activities can place a huge impact on the working of companies so the IT
security mainly helps in collecting the personal data in order to keep it safe. Arden University
There are various merits attached with use of the big data which is enjoyed by the
companies and firm when they all adopt the Big data in their functions. In relation to the Arden
University, the advantages are discussed below-
Analyzing the potential risk- The Big Data is designed with the aim to identify the
problems and risk together with its solution through the risk management which helps in
working of the companies. Arden University makes use of the Big data that helps in
generating awareness of the risk factors so that the university can get prepared of the risk
in advance.
Improvising the retention of the customers- The main function of big data which helps
the businesses is that it helps in keeping he record of every customer in their preference
together with its needs and rights by maintaining its choice. It mainly helps in analyzation
of demand, requirement and needs of the customers. Arden University also uses big data
in order to identify the demand and need of students regarding what course they require
and then try to introduce it.
Innovation in the offering- Big data is aimed to maintain the new technique and idea of
innovation so that large number of customers is attracted and brand value is retained by
upgrading the system. Arden University makes use of this big data that helps in
protecting the services by optimum quality and method (Quboa and Mehandjiev, 2017).
QUESTION 2
Explanation of Information and technology security and measures of data privacy which
companies can implement together with provisions of GDPR.
Information and technology security is a strategic cyber security that helps in preventing
the unauthorized access in business as it deals with computer network and data. It mainly
supports in the maintenance of the relevant and confidential information and also block
information from the axis of the hackers. IT security helps in maintaining the integrity through
which all the relevant information stored in data is kept safe and secure from the unauthorized
access. These types of activities can place a huge impact on the working of companies so the IT
security mainly helps in collecting the personal data in order to keep it safe. Arden University

uses the IT security and keep information of its students and staff in safe and secure manner with
the support of data safe managerial system that helps in maintenance of the availability and
confidentiality of the information stored. It also builds the secure network that protects the
information and data safe from the hackers (Jayashankar and et. al., 2019).
Data privacy measures are referred to as the methods that help in keeping the
information, database and file protected. With the help of this, all these tools on one side helps in
application and control of the technological advancement and on the other side, it helps in
allocation of resources in the proper manner mainly in private sector. Data privacy is considered
as an important element that helps in maintenance of integrity and confidentiality of company by
serving data protection in the organization and also secure them from the axis of hackers so that
there is no impact on the institution of business functions. Arden University also uses this data
privacy measures in order to maintain security of its data by development of all the protocols that
are important so that data and information are given protection from the cyber- crimes and other
types of malicious users that use the data in some other area (Khan and et. al., 2020).
Techniques and tools of IT security and measures of data privacy
Now that the time has changed and it is the new era of technological advancement, there
are many chances of the cyber-crimes in the society so in order to prohibit these, there are
various tools that can be used by the firms in order to protect and secure the information from the
malicious and unauthorized users. These are narrated below-
Firewalls and the intrusion protection IPS- It is the IT security that heads south so that
it can monitor the outgoing traffic in the network together with various blockages of
actions and protect the data from unwanted users. It mainly monitors the network source
so that the unauthorized user can be proclaimed. For instance, Arden University works in
managing consulting services and the analysis about the strategic approaches through the
data that may be kept safe from the process of cyber-crimes. It also helps in managing
outgoing networking area by maintenance of business away from the threats by safety
procedures.
DNS protection- There is the service called the domain name in each computer that
contains IP address which helps in browsing so that all sources are loot from internet by
the support of data safe managerial system that helps in maintenance of the availability and
confidentiality of the information stored. It also builds the secure network that protects the
information and data safe from the hackers (Jayashankar and et. al., 2019).
Data privacy measures are referred to as the methods that help in keeping the
information, database and file protected. With the help of this, all these tools on one side helps in
application and control of the technological advancement and on the other side, it helps in
allocation of resources in the proper manner mainly in private sector. Data privacy is considered
as an important element that helps in maintenance of integrity and confidentiality of company by
serving data protection in the organization and also secure them from the axis of hackers so that
there is no impact on the institution of business functions. Arden University also uses this data
privacy measures in order to maintain security of its data by development of all the protocols that
are important so that data and information are given protection from the cyber- crimes and other
types of malicious users that use the data in some other area (Khan and et. al., 2020).
Techniques and tools of IT security and measures of data privacy
Now that the time has changed and it is the new era of technological advancement, there
are many chances of the cyber-crimes in the society so in order to prohibit these, there are
various tools that can be used by the firms in order to protect and secure the information from the
malicious and unauthorized users. These are narrated below-
Firewalls and the intrusion protection IPS- It is the IT security that heads south so that
it can monitor the outgoing traffic in the network together with various blockages of
actions and protect the data from unwanted users. It mainly monitors the network source
so that the unauthorized user can be proclaimed. For instance, Arden University works in
managing consulting services and the analysis about the strategic approaches through the
data that may be kept safe from the process of cyber-crimes. It also helps in managing
outgoing networking area by maintenance of business away from the threats by safety
procedures.
DNS protection- There is the service called the domain name in each computer that
contains IP address which helps in browsing so that all sources are loot from internet by
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

providing the IP address which is unique of each computer. It helps in maintenance of the
application and also the reliability by the cloud services. It states the approach through
which the security interest can be maintained in the deep business and the data so that it
can be given protection from the threats. Arden University makes use of DNS system so
that it can keep data secure and prohibit the cyber- crimes of any type in the educational
sector by way of blocking the malicious users who even tries to maintain any kind of
connection with the institution (Stewart and Jürjens, 2017).
GDPR and its key provisions
The general data protection regulation is a legal framework which provides the way in
which the personal information and guidelines can be processed and maintained of the person
who is the resident of European Union. This regulation is governed by the European Parliament
and Council that maintains the GDPR provisions. Some of the provisions are discussed below-
Reducing the time period for individual rights- When an individual requests for
accessing personal data, the company shall provide the individual with the relevant
information and that too without any undue delay and within the period of time of one
month from date of the request.
Consent- The organizations that rely on consent for the lawful processing of the data, it
must demonstrate that a valid consent is taken of the person whose information they are
using for processing. The consent which is obtained must be unambiguous, free, specific,
informed and also in plain language.
Enhancement of right of people- Under the legal rules of GDPR, the person has many
rights such as right to get access to its personal data, right to rectify the inaccuracy in its
personal data, right to restrict the further processing of its data, right to portability, right
to object the processing of data and right not to get subject to automated processing like
profiling.
Data protection officer- The company are needed to make a decision regarding whether
it wants to have any data protection officer or not. It is mainly a public authority that the
businesses engages in the large scale systematic and monitoring of the business and
people who are engaged in large scale processing of personal data of the special
application and also the reliability by the cloud services. It states the approach through
which the security interest can be maintained in the deep business and the data so that it
can be given protection from the threats. Arden University makes use of DNS system so
that it can keep data secure and prohibit the cyber- crimes of any type in the educational
sector by way of blocking the malicious users who even tries to maintain any kind of
connection with the institution (Stewart and Jürjens, 2017).
GDPR and its key provisions
The general data protection regulation is a legal framework which provides the way in
which the personal information and guidelines can be processed and maintained of the person
who is the resident of European Union. This regulation is governed by the European Parliament
and Council that maintains the GDPR provisions. Some of the provisions are discussed below-
Reducing the time period for individual rights- When an individual requests for
accessing personal data, the company shall provide the individual with the relevant
information and that too without any undue delay and within the period of time of one
month from date of the request.
Consent- The organizations that rely on consent for the lawful processing of the data, it
must demonstrate that a valid consent is taken of the person whose information they are
using for processing. The consent which is obtained must be unambiguous, free, specific,
informed and also in plain language.
Enhancement of right of people- Under the legal rules of GDPR, the person has many
rights such as right to get access to its personal data, right to rectify the inaccuracy in its
personal data, right to restrict the further processing of its data, right to portability, right
to object the processing of data and right not to get subject to automated processing like
profiling.
Data protection officer- The company are needed to make a decision regarding whether
it wants to have any data protection officer or not. It is mainly a public authority that the
businesses engages in the large scale systematic and monitoring of the business and
people who are engaged in large scale processing of personal data of the special
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

categories. The appointment of the DPO must be voluntarily so that the business can be
monitored.
Extra territorial effect- The GDPR regulation mainly applies when there is processing of
the personal data by the business of European Union irrespective of the fact that whether
the processing which is taking place is in EU or not. It applies also to the non-EU
businesses that process personal data of the citizen of EU which relates to the offering
that is being offered to them (Mohanta and et. al., 2020).
All the above mentioned methods or provisions helps in maintenance of the personal data and
information and also makes sure that there is general protection being given to all data. Arden
University makes sure that it complies with each provision of GDPR so that they can provide
right to access to each student and staff in an effective manner.
QUESTION 3
What is cellular network, its principles components and how does it works.
It is also known as the radio network which helps in the distribution of the overland ways
and methods with the help of which all sales and other fixed locations can be served. It is that
type of technology that helps the hierarchical structure through the Base Transceiver station
(BTS) and covers also the Mobile switching center (MSC). Cellular network helps also in
maintenance of the direct communication with the mobile phones and other types of chronicle
mediums. This has the location which is registered by which all public switch telephone network
(PTSN) may be maintained. All of these networks helps in maintenance of the track of all
important and relevant information regarding its location. It generally framed cellular device that
is maintained by various channels and categorized areas that impart the control channel and the
linkage channel through which the wireless communication may be maintained with the use of
mobile system in all the geographical locations. It gives the framework that helps in emitting
proper frequencies which supports optimization of limited area. It covers every sector and the
mobile phones through which the wireless networking can be maintained so that there is personal
communication made between them. There is a shorter range of transmitter which is made that
helps in maintenance of the cellular digital pocket data (CDPD) which provides security to the
monitored.
Extra territorial effect- The GDPR regulation mainly applies when there is processing of
the personal data by the business of European Union irrespective of the fact that whether
the processing which is taking place is in EU or not. It applies also to the non-EU
businesses that process personal data of the citizen of EU which relates to the offering
that is being offered to them (Mohanta and et. al., 2020).
All the above mentioned methods or provisions helps in maintenance of the personal data and
information and also makes sure that there is general protection being given to all data. Arden
University makes sure that it complies with each provision of GDPR so that they can provide
right to access to each student and staff in an effective manner.
QUESTION 3
What is cellular network, its principles components and how does it works.
It is also known as the radio network which helps in the distribution of the overland ways
and methods with the help of which all sales and other fixed locations can be served. It is that
type of technology that helps the hierarchical structure through the Base Transceiver station
(BTS) and covers also the Mobile switching center (MSC). Cellular network helps also in
maintenance of the direct communication with the mobile phones and other types of chronicle
mediums. This has the location which is registered by which all public switch telephone network
(PTSN) may be maintained. All of these networks helps in maintenance of the track of all
important and relevant information regarding its location. It generally framed cellular device that
is maintained by various channels and categorized areas that impart the control channel and the
linkage channel through which the wireless communication may be maintained with the use of
mobile system in all the geographical locations. It gives the framework that helps in emitting
proper frequencies which supports optimization of limited area. It covers every sector and the
mobile phones through which the wireless networking can be maintained so that there is personal
communication made between them. There is a shorter range of transmitter which is made that
helps in maintenance of the cellular digital pocket data (CDPD) which provides security to the

data and information with proper mechanism that is being made by frequencies and the wireless
connection (Shan and et. al., 2017).
Principle components-
Each of the cellular networks is mainly dependent on the four essential areas that includes
the mobile telephone switching office (MTSO), public switched telephone network (PSTN),
mobile subscriber unit (MSU) and cell sites with various antennas. In order to maintain the
proper business functioning, all networking in cellular network us being used by various
approaches like mobile project, mobile chatting group, all documented areas in the voice
assistant programs and etc. For instance, Arden University have employed the usage various
approached of the email, video conferencing, chatting, group chats and Google documents that
helps in the providing of education in an effective manner. It also gives may real data and
spreadsheets about education and its institution through saving project notes that helps in making
protection in the approachable manner so that every teacher, student and staff may use the
cellular network for building better communication with each other. It also helps in maintenance
of the productivity and performance of the university that it can take a step ahead of its
competitors (Banerjee and Kundu, 2021).
Benefits of cellular network to the business.
In order to maintain the proper cellular network, there must be increased use of the
network that helps in making the speedy data transfer in the era of technical advancement by
using the smartphone device. It also helps in serving the data that is to be transferred in advanced
manner as it is focused in maintenance of the quality. The cellular networks are used otherwise
than making the voice calls. There is improved handset and network that have made the transfer
of data easier because of development of the wide range of the sophisticated mobile phones
which is also called as smartphones. It is focused on the maintenance of better facility for the
communication with the help of which the companies can collaborate with different members bt
technical ideas and inventions. The advantages of the use of cellular network for the business is
narrated below-
Enhancement of the response- The technology in the mobile phones has helped the
businesses in making improvement in the response of its workforce that contributes in
connection (Shan and et. al., 2017).
Principle components-
Each of the cellular networks is mainly dependent on the four essential areas that includes
the mobile telephone switching office (MTSO), public switched telephone network (PSTN),
mobile subscriber unit (MSU) and cell sites with various antennas. In order to maintain the
proper business functioning, all networking in cellular network us being used by various
approaches like mobile project, mobile chatting group, all documented areas in the voice
assistant programs and etc. For instance, Arden University have employed the usage various
approached of the email, video conferencing, chatting, group chats and Google documents that
helps in the providing of education in an effective manner. It also gives may real data and
spreadsheets about education and its institution through saving project notes that helps in making
protection in the approachable manner so that every teacher, student and staff may use the
cellular network for building better communication with each other. It also helps in maintenance
of the productivity and performance of the university that it can take a step ahead of its
competitors (Banerjee and Kundu, 2021).
Benefits of cellular network to the business.
In order to maintain the proper cellular network, there must be increased use of the
network that helps in making the speedy data transfer in the era of technical advancement by
using the smartphone device. It also helps in serving the data that is to be transferred in advanced
manner as it is focused in maintenance of the quality. The cellular networks are used otherwise
than making the voice calls. There is improved handset and network that have made the transfer
of data easier because of development of the wide range of the sophisticated mobile phones
which is also called as smartphones. It is focused on the maintenance of better facility for the
communication with the help of which the companies can collaborate with different members bt
technical ideas and inventions. The advantages of the use of cellular network for the business is
narrated below-
Enhancement of the response- The technology in the mobile phones has helped the
businesses in making improvement in the response of its workforce that contributes in
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

making the work easier. It helps in building the interaction with various responses and
search tools so that chatting can be made easy. The smartphones, laptops and chat
platforms are considered as an important area that contributes in the enhancement of the
response.
Communication enhancement- The cellular network is aimed to maintain the
communication for businesses with the help of which the customers and staff members
are able to share the information in the quick and easy manner. All of these networking
supports in the maintenance of the culture, value and scale. It saves time and takes less
cost as the communication is made easy with this platform. Due to its low cost model, the
universities and businesses take this as a medium to build the channel of communication
among all so that there is effective working in the organization.
Increased collaboration with members- The network of communication helps in
maintenance of the proper collaboration through which the members and staff of the
organization can communicate in an better manner with the help of cellular network.
Increased production- A mobile technology have contributed to the increased
performance of workforce that are working in the organization. The increased
productivity supports in taking the competitive advantage as cellular network helps I
maintenance of the positive approach by easy method of the communication.
Minimum cost and time saving process- It is the cost effective technological
advancement in the world which is used by every business. It helps the business to
develop and grow in various areas as the communication is made easier in order to
expand the business. It also helps in making the communication by saving time of people
as it requires just a click to make the phone call and building the communication (Firica,
2017).
Spreadsheet
search tools so that chatting can be made easy. The smartphones, laptops and chat
platforms are considered as an important area that contributes in the enhancement of the
response.
Communication enhancement- The cellular network is aimed to maintain the
communication for businesses with the help of which the customers and staff members
are able to share the information in the quick and easy manner. All of these networking
supports in the maintenance of the culture, value and scale. It saves time and takes less
cost as the communication is made easy with this platform. Due to its low cost model, the
universities and businesses take this as a medium to build the channel of communication
among all so that there is effective working in the organization.
Increased collaboration with members- The network of communication helps in
maintenance of the proper collaboration through which the members and staff of the
organization can communicate in an better manner with the help of cellular network.
Increased production- A mobile technology have contributed to the increased
performance of workforce that are working in the organization. The increased
productivity supports in taking the competitive advantage as cellular network helps I
maintenance of the positive approach by easy method of the communication.
Minimum cost and time saving process- It is the cost effective technological
advancement in the world which is used by every business. It helps the business to
develop and grow in various areas as the communication is made easier in order to
expand the business. It also helps in making the communication by saving time of people
as it requires just a click to make the phone call and building the communication (Firica,
2017).
Spreadsheet
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser


CONCLUSION
It is summarized from the above report that the technology plays an integral part in
running the business. It supports in serving the consumers with enhanced offering and by
deploying proper technological advancement, the companies can overcome all its issues which
helps in taking a step ahead of competitors. Big data is a technology that helps in collection and
storage of information in the secure manner. The IT security and data privacy measures also help
in maintaining the cyber security and also protects the data from breach of privacy. Cellular
network is one such technology which makes the communication easier in the business and is
cost and time effective. Hence technology helps in making the business easy.
It is summarized from the above report that the technology plays an integral part in
running the business. It supports in serving the consumers with enhanced offering and by
deploying proper technological advancement, the companies can overcome all its issues which
helps in taking a step ahead of competitors. Big data is a technology that helps in collection and
storage of information in the secure manner. The IT security and data privacy measures also help
in maintaining the cyber security and also protects the data from breach of privacy. Cellular
network is one such technology which makes the communication easier in the business and is
cost and time effective. Hence technology helps in making the business easy.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and Journals
Banerjee, A. and Kundu, A., 2021. Cellular Automata based Cryptography Model for Reliable
Encryption Using State Transition in Wireless Network Optimizing Data Security. Wireless
Personal Communications, pp.1-42.
Firica, O., 2017. BLOCKCHAIN TECHNOLOGY: PROMISES AND REALITIES OF THE
YEAR 2017. Quality-Access to Success.
Gregory, A. and Halff, G., 2020. The damage done by big data-driven public relations. Public
Relations Review. 46(2). p.101902.
He, W., Wang, F.K. and Akula, V., 2017. Managing extracted knowledge from big social media
data for business decision making. Journal of Knowledge Management.
Howell, R., van Beers, C. and Doorn, N., 2018. Value capture and value creation: The role of
information technology in business models for frugal innovations in Africa. Technological
Forecasting and Social Change. 131. pp.227-239.
Jayashankar, P., and et. al., 2019. Co-creation of value-in-use through big data technology-a B2B
agricultural perspective. Journal of Business & Industrial Marketing.
Khan, F.A., and et. al., 2020. Blockchain technology, improvement suggestions, security
challenges on smart grid and its application in healthcare for sustainable
development. Sustainable Cities and Society. 55. p.102018.
Mohanta, B.K., and et. al., 2020. Survey on IoT security: challenges and solution using machine
learning, artificial intelligence and blockchain technology. Internet of Things, p.100227.
Quboa, Q. and Mehandjiev, N., 2017, July. Creating intelligent business systems by utilising big
data and semantics. In 2017 IEEE 19th Conference on Business Informatics (CBI) (Vol. 2, pp.
39-46). IEEE.
Shan, L., and et. al., 2017, July. Research of the Capability Open Platform in Mobile Cellular
Network Based on the BS Data. In 2017 4th International Conference on Information Science
and Control Engineering (ICISCE) (pp. 1618-1621). IEEE.
Stewart, H. and Jürjens, J., 2017. Information security management and the human aspect in
organizations. Information & Computer Security.
Wang, S. and Wang, H., 2020. Big data for small and medium-sized enterprises (SME): a
knowledge management model. Journal of Knowledge Management.
Books and Journals
Banerjee, A. and Kundu, A., 2021. Cellular Automata based Cryptography Model for Reliable
Encryption Using State Transition in Wireless Network Optimizing Data Security. Wireless
Personal Communications, pp.1-42.
Firica, O., 2017. BLOCKCHAIN TECHNOLOGY: PROMISES AND REALITIES OF THE
YEAR 2017. Quality-Access to Success.
Gregory, A. and Halff, G., 2020. The damage done by big data-driven public relations. Public
Relations Review. 46(2). p.101902.
He, W., Wang, F.K. and Akula, V., 2017. Managing extracted knowledge from big social media
data for business decision making. Journal of Knowledge Management.
Howell, R., van Beers, C. and Doorn, N., 2018. Value capture and value creation: The role of
information technology in business models for frugal innovations in Africa. Technological
Forecasting and Social Change. 131. pp.227-239.
Jayashankar, P., and et. al., 2019. Co-creation of value-in-use through big data technology-a B2B
agricultural perspective. Journal of Business & Industrial Marketing.
Khan, F.A., and et. al., 2020. Blockchain technology, improvement suggestions, security
challenges on smart grid and its application in healthcare for sustainable
development. Sustainable Cities and Society. 55. p.102018.
Mohanta, B.K., and et. al., 2020. Survey on IoT security: challenges and solution using machine
learning, artificial intelligence and blockchain technology. Internet of Things, p.100227.
Quboa, Q. and Mehandjiev, N., 2017, July. Creating intelligent business systems by utilising big
data and semantics. In 2017 IEEE 19th Conference on Business Informatics (CBI) (Vol. 2, pp.
39-46). IEEE.
Shan, L., and et. al., 2017, July. Research of the Capability Open Platform in Mobile Cellular
Network Based on the BS Data. In 2017 4th International Conference on Information Science
and Control Engineering (ICISCE) (pp. 1618-1621). IEEE.
Stewart, H. and Jürjens, J., 2017. Information security management and the human aspect in
organizations. Information & Computer Security.
Wang, S. and Wang, H., 2020. Big data for small and medium-sized enterprises (SME): a
knowledge management model. Journal of Knowledge Management.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.