University Report: Technology and Trend Monitoring and Business Impact
VerifiedAdded on Ā 2020/10/22
|17
|5810
|257
Report
AI Summary
This report provides an executive summary of technological trends and their impact on businesses, focusing on digital technologies like social media marketing, websites, and mobile applications. It covers digital technologies and emerging trends such as 5G, cybersecurity, IoT, AR, and cloud computing. The report includes a literature review, critical review of sources, data triangulation, and an impact analysis of existing and emerging technologies. It discusses challenges like cybersecurity and data privacy, and explores the use of game theory and technologies like homographic encryption and biometrics. The report also highlights the interplay between IoT and cybersecurity, the vulnerabilities in IoT devices, and the future of IoT in cybersecurity. The report emphasizes the importance of data security measures like firewalls and encryption, while also addressing data triangulation for identifying strengths and weaknesses in IT topics.

Technology & Trend
Monitoring
Monitoring
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1) Executive summary
This report has described about the technological trend and analysis that is impacting on
business. Also, it is described about organisation which will help in superior growth of service
measures which will help in carrying out of services related digital technology. As the
organisation is looking after effective technological advancement, for growth and accessibility, it
can be said that it will help in proper execution of business operations in effective manner. In this
it is also explained about the digital technologies like social media marketing like website or
mobile application. All these technologies that are undertaken by an organisation to keep a check
on the operational measures. This will help in developing a suitable frame work to monitor the
operations and develop a significant strategy to monitor the operations which are undertaken by
organisation. Various media sources and technical theories are undertaken with the assessment of
literature in a significant manner. The report also includes the data triangulation and emerging
trends that are undertaken by the organisation. The flourishing technologies like 5G
communication based technologies, cyber security, internet of things, Augmented reality and
cloud computing are discussed.
In report it is also explained about how current and emerging technologies are impacting
each other. Moreover, what changes is been occurred due to integration of technology and how it
has impacted business. Thus, the focus will be on emerging technologies and its impact. Besides
this, the difficulties been faced in current technologies and what changes is been done is
discussed as well in assignment. The various trends and technologies are been described in
report. The present report discuss about challenges such as cyber security, privacy, etc of data
and information. These all are becoming major threat to organisation. Cyber security can be
termed as the securing and safeguarding of vital information and intellectual property of
organisation. The incorporation of the cyber security measures which are undertaken which will
help in support the protection of vital and significant information which are undertaken in
consideration by organisation. As the data security, privacy and preservation is becoming a
major threat for the companies all around the world. This will lead the organizations to plan their
futures and hence, will lead to development of suitable strategies and operations which are
undertaken in consideration by a business enterprise. In order to maintain the effective and
proper data security measures which are undertaken by the organisation, significant data
protection measures like installing firewalls, data security locks, biometric configurations, and
This report has described about the technological trend and analysis that is impacting on
business. Also, it is described about organisation which will help in superior growth of service
measures which will help in carrying out of services related digital technology. As the
organisation is looking after effective technological advancement, for growth and accessibility, it
can be said that it will help in proper execution of business operations in effective manner. In this
it is also explained about the digital technologies like social media marketing like website or
mobile application. All these technologies that are undertaken by an organisation to keep a check
on the operational measures. This will help in developing a suitable frame work to monitor the
operations and develop a significant strategy to monitor the operations which are undertaken by
organisation. Various media sources and technical theories are undertaken with the assessment of
literature in a significant manner. The report also includes the data triangulation and emerging
trends that are undertaken by the organisation. The flourishing technologies like 5G
communication based technologies, cyber security, internet of things, Augmented reality and
cloud computing are discussed.
In report it is also explained about how current and emerging technologies are impacting
each other. Moreover, what changes is been occurred due to integration of technology and how it
has impacted business. Thus, the focus will be on emerging technologies and its impact. Besides
this, the difficulties been faced in current technologies and what changes is been done is
discussed as well in assignment. The various trends and technologies are been described in
report. The present report discuss about challenges such as cyber security, privacy, etc of data
and information. These all are becoming major threat to organisation. Cyber security can be
termed as the securing and safeguarding of vital information and intellectual property of
organisation. The incorporation of the cyber security measures which are undertaken which will
help in support the protection of vital and significant information which are undertaken in
consideration by organisation. As the data security, privacy and preservation is becoming a
major threat for the companies all around the world. This will lead the organizations to plan their
futures and hence, will lead to development of suitable strategies and operations which are
undertaken in consideration by a business enterprise. In order to maintain the effective and
proper data security measures which are undertaken by the organisation, significant data
protection measures like installing firewalls, data security locks, biometric configurations, and

data encryption methods can be incorporated which will help in significant improvement of data
security measures which are undertaken by the organisation on a significant level.
security measures which are undertaken by the organisation on a significant level.
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Table of Contents
2) Literature review .....................................................................................................................1
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation..............................................................................3
4) Critically evaluate the emerging technological trends and and identify potential challenges
for this trends...............................................................................................................................6
5) Impact analysis of existing and emerging technologies in future trends.................................9
6) Summary................................................................................................................................10
REFERENCES..............................................................................................................................12
2) Literature review .....................................................................................................................1
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation..............................................................................3
4) Critically evaluate the emerging technological trends and and identify potential challenges
for this trends...............................................................................................................................6
5) Impact analysis of existing and emerging technologies in future trends.................................9
6) Summary................................................................................................................................10
REFERENCES..............................................................................................................................12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2) Literature review
In modern era of technological advancement, there has been high rise in security breaches. It
has resulted in huge loss both in terms of finance and data and information. According to Ena
et.al., 2016, cyber security plays a significant role in todayās digital era. This is because securing
information is one of the biggest challenge that is faced by companies. In this government and
companies have formed certain rules and regulations. Besides this, various security measures are
taken in order to protect crucial data. The leakage of data is a cyber crime. For this in many
countries' government have made laws for punishment. The major cases of cyber security are
related to social media. Generally, cyber attack occurs due to malware and virus that are sent into
network by hackers or third parties to steal data and information. The elements of cyber security
are application, network, operational, etc. (Wortmann and Flüchter, 2015). It is analysed that
traditional approach of protecting system cannot be used in current technological environment.
This is because it contains many loopholes and defects.
As stated by Buczak and Guven, 2016, securing data allows companies to gain trust of
customers. The data is stored by third parties or in servers. Now, the data is accessed through
authentication. This reduces risk of data breach. However, emerging technologies like cloud
computing, AI, etc. has forced companies to use cyber security techniques. This has enabled
them to prevent loss of data (Importance of cyber security. 2018). Apart from it, they need to
maintain security by using various resources. The main issue that is prevailing in cyber security
is upgrade of technology that is resulting in cyber crime. Due to this it has become difficult to
protect data and information. Also, they are not able to maintain efficiency of devices used in it.
There are several threats of cyber security as well such as ransom ware, malware, etc. which
affect authenticity of data.
Game theory for cyber security ā
It states that in a game a person chooses actions those results in giving best possible
rewards. In this a player is an entity that makes decision and performs tasks. Similarly, in cyber
security it is necessary to protect data and info. There are two concepts in game that is rationale
and knowledge. So, in cyber security rationale refers to securing data and knowledge means
how.
1
In modern era of technological advancement, there has been high rise in security breaches. It
has resulted in huge loss both in terms of finance and data and information. According to Ena
et.al., 2016, cyber security plays a significant role in todayās digital era. This is because securing
information is one of the biggest challenge that is faced by companies. In this government and
companies have formed certain rules and regulations. Besides this, various security measures are
taken in order to protect crucial data. The leakage of data is a cyber crime. For this in many
countries' government have made laws for punishment. The major cases of cyber security are
related to social media. Generally, cyber attack occurs due to malware and virus that are sent into
network by hackers or third parties to steal data and information. The elements of cyber security
are application, network, operational, etc. (Wortmann and Flüchter, 2015). It is analysed that
traditional approach of protecting system cannot be used in current technological environment.
This is because it contains many loopholes and defects.
As stated by Buczak and Guven, 2016, securing data allows companies to gain trust of
customers. The data is stored by third parties or in servers. Now, the data is accessed through
authentication. This reduces risk of data breach. However, emerging technologies like cloud
computing, AI, etc. has forced companies to use cyber security techniques. This has enabled
them to prevent loss of data (Importance of cyber security. 2018). Apart from it, they need to
maintain security by using various resources. The main issue that is prevailing in cyber security
is upgrade of technology that is resulting in cyber crime. Due to this it has become difficult to
protect data and information. Also, they are not able to maintain efficiency of devices used in it.
There are several threats of cyber security as well such as ransom ware, malware, etc. which
affect authenticity of data.
Game theory for cyber security ā
It states that in a game a person chooses actions those results in giving best possible
rewards. In this a player is an entity that makes decision and performs tasks. Similarly, in cyber
security it is necessary to protect data and info. There are two concepts in game that is rationale
and knowledge. So, in cyber security rationale refers to securing data and knowledge means
how.
1

As elucidated by Wortmann and Flüchter, 2015., cyber security is a wide concept that includes
many things. It is not only related to protecting data but also on designing process or systems
through which network is secured. So, it is necessary to manage cyber security by taking
appropriate measures. In present time, a new trend has emerged in cyber security. Homographic
encryption is a technique that is used in this. Here, an encryption occurs that allows computation
on cipher texts and generates an encrypted result. So, when decrypted it matches with plaintext
that has been performed in operations. As said by Islam et.al., 2015, now companies are using
biometrics to record and store data. Also, it is used to provide access to use of data. Alongside it,
there are many other techniques as well taken to protect data. Antivirus software are been
implemented that removes virus and worms that enters in system or network (Cyber secruity
challenges. 2016). Besides this, firewalls are installed by companies in network to access
internet. It examines each data packets and detects malware. It is necessary to monitor the way in
data is secured. This is because it helps in finding out how encryption and decryption occurs.
Recently, in cyber security system, an alarm is installed that make user aware about any
malicious activity or virus.
In view of Cherdantseva et.al., 2016, with cyber securiy, internet of things has created a
great positive impact on world. It has highly transformed the way of connecting devices. It has
allowed devices to connect with each other through internet. This has allowed people and
companies to implement this concept at large scale. Besides this, there are many applications
emerged in cyber security.. Moreover, it is also been used in securing and protecting data. There
has been a high growth in past years.
Moreover, in study done by Kumari, Mathew and Syal, 2017, it is evaluated that the use of
IOT with cyber security has supported in many ways. It has assisted in monitoring devices from
anywhere, anytime. This has led to ease in transmission of data from one place to another. Also,
it benefits business to redesign their systems in cost effective way. In many places like at airports
and railway stations IOT in cyber secuirty has eased process of verifying information. By
gathering real time data, quick decisions are taken. Alongside this, in health care it is giving real
time info to people. With help of it, they are able to protect data and informaiton.
There are many different technologies related to IOT. It has integrated smart phones with
cloud. Also, sensing technology has given people to get involved in real world. IOT have
provided safety in blocking malicious activity. Through wireless connections devices range is
2
many things. It is not only related to protecting data but also on designing process or systems
through which network is secured. So, it is necessary to manage cyber security by taking
appropriate measures. In present time, a new trend has emerged in cyber security. Homographic
encryption is a technique that is used in this. Here, an encryption occurs that allows computation
on cipher texts and generates an encrypted result. So, when decrypted it matches with plaintext
that has been performed in operations. As said by Islam et.al., 2015, now companies are using
biometrics to record and store data. Also, it is used to provide access to use of data. Alongside it,
there are many other techniques as well taken to protect data. Antivirus software are been
implemented that removes virus and worms that enters in system or network (Cyber secruity
challenges. 2016). Besides this, firewalls are installed by companies in network to access
internet. It examines each data packets and detects malware. It is necessary to monitor the way in
data is secured. This is because it helps in finding out how encryption and decryption occurs.
Recently, in cyber security system, an alarm is installed that make user aware about any
malicious activity or virus.
In view of Cherdantseva et.al., 2016, with cyber securiy, internet of things has created a
great positive impact on world. It has highly transformed the way of connecting devices. It has
allowed devices to connect with each other through internet. This has allowed people and
companies to implement this concept at large scale. Besides this, there are many applications
emerged in cyber security.. Moreover, it is also been used in securing and protecting data. There
has been a high growth in past years.
Moreover, in study done by Kumari, Mathew and Syal, 2017, it is evaluated that the use of
IOT with cyber security has supported in many ways. It has assisted in monitoring devices from
anywhere, anytime. This has led to ease in transmission of data from one place to another. Also,
it benefits business to redesign their systems in cost effective way. In many places like at airports
and railway stations IOT in cyber secuirty has eased process of verifying information. By
gathering real time data, quick decisions are taken. Alongside this, in health care it is giving real
time info to people. With help of it, they are able to protect data and informaiton.
There are many different technologies related to IOT. It has integrated smart phones with
cloud. Also, sensing technology has given people to get involved in real world. IOT have
provided safety in blocking malicious activity. Through wireless connections devices range is
2
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

increased. It bridges gap between communication and connectivity. But in this there is slight
difference as AI is completely automated where IOT include implementing system in network.
In the opinion of Zhang et.al., 2018, the future of IOT in caber security will bring drastic
changes in protecting data and information within business. There will be major requirements of
hardware and software in implementing network. Besides this, reliability and integrity of data
will become priority for business. There will save money and time of people. Moreover, people
will highly engage with technology. There will be development of more advance and smart
applications. It will include new features which evolve new trends in technology.
Buczak, and Guven, 2016., said that both IOT are cyber security are interrelated to each
other. This can be said because cyber security has aroused due to IOT. It is observed in IOT
company have to implement a strong cyber security system. Also, it is essential to monitor IOT
so that flow of communication is identified. This helps in finding out how devices are connected
and from where data is sent. Basically, by using cyber security applications in IOT, the data can
be protected. But in changing world, expansion of IOT is bigger risk in cyber security. In study it
is said that 70% of devices connected in IOT contains vulnerabilities. It is highly affecting the
overall network. Therefore, it is very necessary to secure IOT so that data authenticity is
maintained.
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation
The assessment of the data sources for Google Scholar and other data resources that are
undertaken for the evaluation purpose. This will help in identifying the issues and challenges that
are related to digital technology and data security measures which are undertaken within the
firm. As per the views of Wang et.al., 2016, majority of business operations are been carried out
within organisation that will help in significant rise in the security concerns that are undertaken
within the organisation. The proper assessment of the security issues and evaluation measures
which are undertaken within the organisation are followed.
For the effective establishing of the operations which are undertaken within the
organisation, the cyber security and Internet of Things (IOT) measures are taken in which
supports the proper execution of digital data assessment and evaluation measures. The cyber
security will help in evaluating the threats related to the unauthenticated risks within the
organisation. While the IOT will involve the significant automation of the operations or services
3
difference as AI is completely automated where IOT include implementing system in network.
In the opinion of Zhang et.al., 2018, the future of IOT in caber security will bring drastic
changes in protecting data and information within business. There will be major requirements of
hardware and software in implementing network. Besides this, reliability and integrity of data
will become priority for business. There will save money and time of people. Moreover, people
will highly engage with technology. There will be development of more advance and smart
applications. It will include new features which evolve new trends in technology.
Buczak, and Guven, 2016., said that both IOT are cyber security are interrelated to each
other. This can be said because cyber security has aroused due to IOT. It is observed in IOT
company have to implement a strong cyber security system. Also, it is essential to monitor IOT
so that flow of communication is identified. This helps in finding out how devices are connected
and from where data is sent. Basically, by using cyber security applications in IOT, the data can
be protected. But in changing world, expansion of IOT is bigger risk in cyber security. In study it
is said that 70% of devices connected in IOT contains vulnerabilities. It is highly affecting the
overall network. Therefore, it is very necessary to secure IOT so that data authenticity is
maintained.
3 Critical review of sources and data triangulation highlighting issues and identifies strengths
and weaknesses of IT topics for organisation
The assessment of the data sources for Google Scholar and other data resources that are
undertaken for the evaluation purpose. This will help in identifying the issues and challenges that
are related to digital technology and data security measures which are undertaken within the
firm. As per the views of Wang et.al., 2016, majority of business operations are been carried out
within organisation that will help in significant rise in the security concerns that are undertaken
within the organisation. The proper assessment of the security issues and evaluation measures
which are undertaken within the organisation are followed.
For the effective establishing of the operations which are undertaken within the
organisation, the cyber security and Internet of Things (IOT) measures are taken in which
supports the proper execution of digital data assessment and evaluation measures. The cyber
security will help in evaluating the threats related to the unauthenticated risks within the
organisation. While the IOT will involve the significant automation of the operations or services
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

which are carried out by the organisation. All this measures will lead to a significant analysis of
trends and implementing digital technology within the organisation. Besides this, it will support
the good and accessible operations including the evaluation of strengths and weaknesses of these
digital technological measures which are carried out by the organisation for effective growth of
organisation.
Data Triangulation
Data triangulation can be termed as the major process of involving, collecting and
analysing the data using multiple methods simultaneously. It is used to identify the critical
factors such as strengths and weaknesses of a model or tool which will impact and influence the
overall establishment of IT technologies within a business enterprise (Ena et.al. 2016). It will
help in gathering data from authentic and relevant sources. By this it will be easy to analyze the
topic in depth. Also, the issues can be easily highlighted. Through data triangulation strength and
weakness is identified.
This analysis will also help in establishing a suitable operations and carrying out of the
assessment and evaluation measures which are undertaken within organisation. The data
triangulation is however a very costly and time consuming process. On the basis of the various
measures that are undertaken for data triangulation measures which are undertaken by
organisation, the strengths and weaknesses of effective IT topics like cyber security and Internet
of Things is been analysed. This will include the following components.
By analysing data it can be stated that cyber security has provided a major support for
organisation to protect data and information. The use of biometrics has helped in maintaining
privacy of staff and preventing unauthorised access.
Issues related to incorporation and implementation of cyber security measures within
organisation:
ļ· As it is a costly process, proper funding in vast amount is required which can be a tedious
task for a small scale enterprise.
ļ· Besides this, it requires experts to constantly monitor the data threats and improve the
quality of data security measures.
ļ· Regular updates and maintenance will lead to additional expenses that can turn out to be
an unnecessary burden on then organisation.
Strengths of Cyber security:
4
trends and implementing digital technology within the organisation. Besides this, it will support
the good and accessible operations including the evaluation of strengths and weaknesses of these
digital technological measures which are carried out by the organisation for effective growth of
organisation.
Data Triangulation
Data triangulation can be termed as the major process of involving, collecting and
analysing the data using multiple methods simultaneously. It is used to identify the critical
factors such as strengths and weaknesses of a model or tool which will impact and influence the
overall establishment of IT technologies within a business enterprise (Ena et.al. 2016). It will
help in gathering data from authentic and relevant sources. By this it will be easy to analyze the
topic in depth. Also, the issues can be easily highlighted. Through data triangulation strength and
weakness is identified.
This analysis will also help in establishing a suitable operations and carrying out of the
assessment and evaluation measures which are undertaken within organisation. The data
triangulation is however a very costly and time consuming process. On the basis of the various
measures that are undertaken for data triangulation measures which are undertaken by
organisation, the strengths and weaknesses of effective IT topics like cyber security and Internet
of Things is been analysed. This will include the following components.
By analysing data it can be stated that cyber security has provided a major support for
organisation to protect data and information. The use of biometrics has helped in maintaining
privacy of staff and preventing unauthorised access.
Issues related to incorporation and implementation of cyber security measures within
organisation:
ļ· As it is a costly process, proper funding in vast amount is required which can be a tedious
task for a small scale enterprise.
ļ· Besides this, it requires experts to constantly monitor the data threats and improve the
quality of data security measures.
ļ· Regular updates and maintenance will lead to additional expenses that can turn out to be
an unnecessary burden on then organisation.
Strengths of Cyber security:
4

ļ· Helps in protecting vital information: The cyber security measures such as biometric
locks and Homographic encryption that is incorporated by organisation (Wortmann and
Flüchter, 2015). This will help in proper analysis of the threat factors and improve data
security measures which are followed by the organisation.
ļ· Prevention of data theft: The other major strength of the data security measures which
are undertaken by organisation for data security is that it prevents the data theft and
misuse by others and ensures proper management of significant information which will
help in proper assessment of the factors which will help in controlling the
misinterpretation of the information.
ļ· Ensuring the proper authentication: As the biometric and Homographic encryption is
used, this will support in providing suitable authentication to the person getting access to
information. This will help in proper handling of the vital data's and intellectual property
of an organisation.
ļ· Improve the digital framework of organisation: As the digital security measures are
undertaken within the organisation, their overall digital infrastructure will b improved
and made precise which will help in enhancing their quality of operations (Simon, 2015).
This will enhance the quality of the measures which are undertaken for securing and
preserving the vital data information within organisation.
Weaknesses of data security and preservation measures:
ļ· It is a very time consuming and costly process: The data security and preservation
measures which are taken in consideration by organisation is a very time consuming and
relatively costly process which is effectively applied and implemented by only selected
enterprises. This is the major drawback of this process.
ļ· Requires high level of expertise: The application of data security and protection
measures which are undertaken by the organisation requires significant level of
knowledge and precision. The availability of high level of expertise is a major challenge
for the organisation.
ļ· Not a full proof solution: Any sort of data security measure, no matter how advance it
is, cannot completely eliminate the risk of data threat (Islam et.al., 2015). As there is a
constant risk on the system from unknown bloatware, malware or virus, regular updates
and preventive measures are required to be observed.
5
locks and Homographic encryption that is incorporated by organisation (Wortmann and
Flüchter, 2015). This will help in proper analysis of the threat factors and improve data
security measures which are followed by the organisation.
ļ· Prevention of data theft: The other major strength of the data security measures which
are undertaken by organisation for data security is that it prevents the data theft and
misuse by others and ensures proper management of significant information which will
help in proper assessment of the factors which will help in controlling the
misinterpretation of the information.
ļ· Ensuring the proper authentication: As the biometric and Homographic encryption is
used, this will support in providing suitable authentication to the person getting access to
information. This will help in proper handling of the vital data's and intellectual property
of an organisation.
ļ· Improve the digital framework of organisation: As the digital security measures are
undertaken within the organisation, their overall digital infrastructure will b improved
and made precise which will help in enhancing their quality of operations (Simon, 2015).
This will enhance the quality of the measures which are undertaken for securing and
preserving the vital data information within organisation.
Weaknesses of data security and preservation measures:
ļ· It is a very time consuming and costly process: The data security and preservation
measures which are taken in consideration by organisation is a very time consuming and
relatively costly process which is effectively applied and implemented by only selected
enterprises. This is the major drawback of this process.
ļ· Requires high level of expertise: The application of data security and protection
measures which are undertaken by the organisation requires significant level of
knowledge and precision. The availability of high level of expertise is a major challenge
for the organisation.
ļ· Not a full proof solution: Any sort of data security measure, no matter how advance it
is, cannot completely eliminate the risk of data threat (Islam et.al., 2015). As there is a
constant risk on the system from unknown bloatware, malware or virus, regular updates
and preventive measures are required to be observed.
5
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Summary
It can be identified from above that there are many strengths and weakness of cyber
security. The strength is it helps in preventing privacy of data and information, also helps in
maintaining authenticity of staff (Buczak and Guven, 2016). Moreover, it helps in preventing
loss of data as no unauthorised person is able to get access of it. But the weakness of cyber
security it can be easily breached through various ways. Moreover, it is time consuming process
as it requires proper monitoring and control. As concluded cyber security is transforming the
way of preventing data and information. The devices are been installed to regulate and monitor
data. It has helped protecting cruciail info and maintaining privacy.
4) Critically evaluate the emerging technological trends and identify potential challenges for this
trends
With the advancement of technologies and digitization of every aspects of the businesses,
this can be said that a wide range of technological trends and technologies are emerging which
will help in proper planning of operations and thus will lead to improving the overall
performance of organization. Proper utilization of these trends will contribute in significant
growth of a firm. Some major emerging technological trends that are monitored and followed by
a business enterprise are as follows:
IoT integration with devices: As per the views of Heinemann and Freckmann 2015, the
usage of IoT in various technological devices will help in suitable planning of the operational
measures which are carried out by firm. The concepts like internet of things or IoT will help in a
significant planning and getting up of the conceptual ideas which will help in suitable of
organization and the products or services which is been offered by them. With the passage of
time, more and more services and products are coming with IoT as it makes the devices to be
more effective and smart. This will not only improve the value of products and services which
are carried out by the organization. All these measures which are carried out by the
administration, supports a good increase in the quality of products or services that includes the
IoT.
The use of IoT within the digital technology is going to be a successful technological
trend that will help in improving the quality of products and services and thus, includes the
development of latest technologies which will help in significant planning of the operations
6
It can be identified from above that there are many strengths and weakness of cyber
security. The strength is it helps in preventing privacy of data and information, also helps in
maintaining authenticity of staff (Buczak and Guven, 2016). Moreover, it helps in preventing
loss of data as no unauthorised person is able to get access of it. But the weakness of cyber
security it can be easily breached through various ways. Moreover, it is time consuming process
as it requires proper monitoring and control. As concluded cyber security is transforming the
way of preventing data and information. The devices are been installed to regulate and monitor
data. It has helped protecting cruciail info and maintaining privacy.
4) Critically evaluate the emerging technological trends and identify potential challenges for this
trends
With the advancement of technologies and digitization of every aspects of the businesses,
this can be said that a wide range of technological trends and technologies are emerging which
will help in proper planning of operations and thus will lead to improving the overall
performance of organization. Proper utilization of these trends will contribute in significant
growth of a firm. Some major emerging technological trends that are monitored and followed by
a business enterprise are as follows:
IoT integration with devices: As per the views of Heinemann and Freckmann 2015, the
usage of IoT in various technological devices will help in suitable planning of the operational
measures which are carried out by firm. The concepts like internet of things or IoT will help in a
significant planning and getting up of the conceptual ideas which will help in suitable of
organization and the products or services which is been offered by them. With the passage of
time, more and more services and products are coming with IoT as it makes the devices to be
more effective and smart. This will not only improve the value of products and services which
are carried out by the organization. All these measures which are carried out by the
administration, supports a good increase in the quality of products or services that includes the
IoT.
The use of IoT within the digital technology is going to be a successful technological
trend that will help in improving the quality of products and services and thus, includes the
development of latest technologies which will help in significant planning of the operations
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

which will contribute to growth of an organization, elucidating the importance of IoT on the
digitization and growth of organization. However there are many fields like automated driving
where IoT has not turned out to be satisfactory viable. The main challenge in this is lack of
infrastructure and slow speed of internet. Moreover, the cost of implementing IOT is very high
and requires proper monitoring and control.
Cloud computing ā this is also an emerging trend which has enabled business to provide
services through internet. This technology has transformed the way of storing, accessing, etc
data. With this they are able to cover wide area and make it easy for user to access it. In simple
terms cloud computing is use of hardware and software to deliver service over internet. This
enable user to access and use applications and files through devices in network. For example ā
Google provide G mail as service, Dropbox enables to store data, etc. these all are able to capture
market by using internet. Through this, user can access services by using infrastructure. They
only have to pay for services that they are using. This trend is because of integration of services
with internet. Now, companies are focusing on using third parties to offer services. Along with it,
other small business are using IT infrastructure. In this the main challenge is loss of data. There
is a lot of data breach done by hacker. Due to it, privacy and authenticity of data is not
maintained. The loss of data is concern for business in using cloud computing services.
Block chain technology ā this technology will enable companies to integrate their supply
chain operations. By this they will easily collaborate suppliers with organisation making it easy
to communicate with them. Moreover, block chain is enabling in online transaction with
transparency. It has helped in providing competitive advantage to company in the market. The
suppliers are able to get real time data of products and can easily access it. Furthermore, they are
connected in a network with each other each one having a copy of ledger. The implementation if
block chain technology has enabled in tracking of products, maintaining their quality, etc.
besides this, it has helped in digital payment easily. This trend has emerged due to expansion of
supply chain.
Augmented reality: Augmented reality can be termed out as the virtualization of the real
world that includes multiple human sensory modalities which will assists in significant and
effective rise in the technological advancement. The research of Cummings, Beacon Technical
Systems LLC (2017) suggests that use of AR will involve the simulation measures which will
help in improving the real time experience and understanding of the users. All these measures
7
digitization and growth of organization. However there are many fields like automated driving
where IoT has not turned out to be satisfactory viable. The main challenge in this is lack of
infrastructure and slow speed of internet. Moreover, the cost of implementing IOT is very high
and requires proper monitoring and control.
Cloud computing ā this is also an emerging trend which has enabled business to provide
services through internet. This technology has transformed the way of storing, accessing, etc
data. With this they are able to cover wide area and make it easy for user to access it. In simple
terms cloud computing is use of hardware and software to deliver service over internet. This
enable user to access and use applications and files through devices in network. For example ā
Google provide G mail as service, Dropbox enables to store data, etc. these all are able to capture
market by using internet. Through this, user can access services by using infrastructure. They
only have to pay for services that they are using. This trend is because of integration of services
with internet. Now, companies are focusing on using third parties to offer services. Along with it,
other small business are using IT infrastructure. In this the main challenge is loss of data. There
is a lot of data breach done by hacker. Due to it, privacy and authenticity of data is not
maintained. The loss of data is concern for business in using cloud computing services.
Block chain technology ā this technology will enable companies to integrate their supply
chain operations. By this they will easily collaborate suppliers with organisation making it easy
to communicate with them. Moreover, block chain is enabling in online transaction with
transparency. It has helped in providing competitive advantage to company in the market. The
suppliers are able to get real time data of products and can easily access it. Furthermore, they are
connected in a network with each other each one having a copy of ledger. The implementation if
block chain technology has enabled in tracking of products, maintaining their quality, etc.
besides this, it has helped in digital payment easily. This trend has emerged due to expansion of
supply chain.
Augmented reality: Augmented reality can be termed out as the virtualization of the real
world that includes multiple human sensory modalities which will assists in significant and
effective rise in the technological advancement. The research of Cummings, Beacon Technical
Systems LLC (2017) suggests that use of AR will involve the simulation measures which will
help in improving the real time experience and understanding of the users. All these measures
7

will help in significant planning of the digitization approaches which will help in suitable
planning which assist in a significant growth that will help ion proper planning f the service
measures which will help in significant planning of digital operations and data planning which is
been followed by the firm.
The Augmented Reality will find out a multiple level of applications which will help in
suitable handling of the operations measures which supports a significant planning of
technological advancement which will help in proper planning of significant operations which
will help in improving the effective planning of operations which will support a significant
planning of the operations. All these measures will help in suitable planning of service activities
which will lead to a significant planning of operational measures. Besides this, it will help
organization to get an idea about the real time situation to be faced by a project, prior to its
practical implementation. However, it is not completely reliable as it doesn't provide the exact
situation insight that may occur. There are certain difficulties occurring in AR. Social rejection is
one of them. People do not like it to wear AR machines and devices. They experience is also
poor as there is poor resolution, human interaction, etc. this has created a negative image of AR
in the minds of people. Currently, in AR advancement is been done. Improvements related to
resolution are made to provide real time experience to people. Moreover, awareness is been
generated by educating people.
5) Impact analysis of existing and emerging technologies in future trends
The emerging and digital technologies which are analyzed and categorized within the
organization supporting evaluation of the measures which will assist in effective planning
activities. All these measures like the rising trend of e commerce measures for household
purpose, implementing Augmented reality and Internet of things with machine based learning
operations and including the AI measures for cyber data security will help in enhancing the
digitization measures which are carried out by organization. As discussed above, the digital
measures like Cyber security will help in significant planning of the management measures that
will support handling of future trends. All these approaches which are carried out by an
organization will help in proper planning of the operations which are carried out in a significant
manner as per the evaluation of literature and analysis of a wide variety of data sources, this can
be said that this will lead to a significant planning of operations.
8
planning which assist in a significant growth that will help ion proper planning f the service
measures which will help in significant planning of digital operations and data planning which is
been followed by the firm.
The Augmented Reality will find out a multiple level of applications which will help in
suitable handling of the operations measures which supports a significant planning of
technological advancement which will help in proper planning of significant operations which
will help in improving the effective planning of operations which will support a significant
planning of the operations. All these measures will help in suitable planning of service activities
which will lead to a significant planning of operational measures. Besides this, it will help
organization to get an idea about the real time situation to be faced by a project, prior to its
practical implementation. However, it is not completely reliable as it doesn't provide the exact
situation insight that may occur. There are certain difficulties occurring in AR. Social rejection is
one of them. People do not like it to wear AR machines and devices. They experience is also
poor as there is poor resolution, human interaction, etc. this has created a negative image of AR
in the minds of people. Currently, in AR advancement is been done. Improvements related to
resolution are made to provide real time experience to people. Moreover, awareness is been
generated by educating people.
5) Impact analysis of existing and emerging technologies in future trends
The emerging and digital technologies which are analyzed and categorized within the
organization supporting evaluation of the measures which will assist in effective planning
activities. All these measures like the rising trend of e commerce measures for household
purpose, implementing Augmented reality and Internet of things with machine based learning
operations and including the AI measures for cyber data security will help in enhancing the
digitization measures which are carried out by organization. As discussed above, the digital
measures like Cyber security will help in significant planning of the management measures that
will support handling of future trends. All these approaches which are carried out by an
organization will help in proper planning of the operations which are carried out in a significant
manner as per the evaluation of literature and analysis of a wide variety of data sources, this can
be said that this will lead to a significant planning of operations.
8
ā This is a preview!ā
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
Ā +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright Ā© 2020ā2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





