Professional Documents
Culture Documents
Individual Report Set 2
Individual Report Set 2
Individual Report Set 2
Individual Report
Student Name:
Student ID:
Introduction................................................................................................................................5
Literature Review.......................................................................................................................7
Collaboration Tools................................................................................................................7
Cloud storage.........................................................................................................................8
Cloud computing..................................................................................................................10
Collaboration tools...............................................................................................................18
ProofHub:.........................................................................................................................18
Zoom................................................................................................................................20
Conclusion:..............................................................................................................................22
Reference List..........................................................................................................................23
2 |P a g e
Abstract
As we can see, Information and Communication Technology (ICT) has become the most
important aspect in the current period, and the individual assignment will emphasis on the
role ICT plays in digital business. In the introduction section, we will first introduce ICT and
then explore how ICT assisted businesses throughout the epidemic. In the literature review
section of this assignment, I will cover the definitions, usage, pros, and cons of the following
topics: collaboration tools, cloud storage, cloud computing, security, and privacy. The
following section is Analysis and Discussion, in which I will talk about two collaboration
tools, cloud, and how they benefited companies throughout the epidemic, as well as how they
became the lifesavers for organizations. In this study, I will also explore the private internet
in the United Kingdom, as well as the merits and problems of the U.K. private internet.
3 |P a g e
Introduction
The full meaning of ICT is Information and Communication Technologies which refers to a
set of technological resources and tools and by using these tools and resources, users can
ICT’s main focus in business is to reach mass customer and gain higher profit in short time.
Using different ICT-controlled equipment, it is feasible to create more in less time. This
reduces the cost of creation. Product promotions may be distributed all over the world via the
internet, and ads for products or services can be pushed at a minimal cost or for free via blogs
or social networking sites. Database software of many forms may be used to maintain product
4 |P a g e
During Corona Pandemic, all businesses, big and small, are hit hard. That is when online
business became very popular. People start businesses through different pages and websites.
The inclusion of ICT in digital marketing or online business coronation has come as a
computing, security, and privacy. In the Analysis and discussion, I will speak about two
collaboration tools, cloud, and how they helped firms throughout the outbreak. In addition, I
plan to examine the advantages and drawbacks of the UK's private internet in this research.
5 |P a g e
Literature Review
Collaboration Tools
Collaboration is a well-known working method for achieving company goals and objectives.
Collaboration tools assist individuals in working together. Tools like these are designed to
help a group of two or more people work together to achieve goals and objectives. It may be
6 |P a g e
Advantages:
Quick communication
Project Management
Save time
Disadvantages:
7 |P a g e
Cloud storage
Cloud storage is a kind of cloud computing that stores and maintains data through the usage
of the internet. Users may access the stored data at any time and from any location.
Data and files can be stored in the cloud and accessed remotely through the internet
connection. When data is send for storage to the third-party cloud provider then company has
8 |P a g e
Sustainability & Application of Cloud storage
In order to testing and developing application, cloud storage is the best choice. With very low
capital and investment, company can use cloud storage to stores its data and information.
Data backup, data exchange, and resource service are just few of the uses for cloud storage.
Other network services can also benefit from standardized interfaces. The B-Cloud system,
which was self-developed, is an example of cloud storage technology and applications. Data
and files can be stored in the cloud and accessed remotely through the internet or a private
network connection. Data that is sent to a third-party cloud provider for storage is no longer
Cheap Cost
Automatic Back-up
9 |P a g e
Cloud computing
Cloud computing refers to the provide many services through internet which includes servers,
Cloud computing has recently become one of the most exciting technologies in the world of
computing has started a new revolution in the world of computers, both economically and
technologically. We've been involved with cloud computing for a long time (Linthicum,
2018). For example, almost all of us use Yahoo, Gmail, or Hotmail to use email. If you have
an email account, you can use Gmail from anywhere, anytime, from any device. Cloud
computing is being used in many fields like Picasa, the weather of the world or the census of
10 |
Page
Advantage
1. Moving to cloud computing can reduce the cost of operating and maintaining IT systems.
2. Public, private, or hybrid storage offers can be chosen depending on security and other
considerations.
3. Having an internet connection can be used to access the required applications or data from
anywhere.
11 |
Page
4. Due to the network backup of cloud computing, hardware failure does not result in data
loss.
5. Cloud computing uses remote resources, and saves servers and other necessary database
organizations.
6. Cloud-based solutions are suitable for enterprises with variable or extended bandwidth
requirements.
7. You can save projects online and access them if you need to use cloud computing for
business. This will make the database and other files more secure.
9. Activities can be easily monitored. As a result, activities can be managed in line with the
10. One of the great benefits of cloud computing is that it allows many people to share or use
information together.
Disadvantage
1. There is always a risk that a user’s data may be accessed by other people (hacking).
2. Cloud computing is dependent on the Internet. This means that you must be connected to
12 |
Page
3. There is No control over data, information or programs, or applications.
Privacy refers to regulating your personal information and how it is used. Any data that may
be used to identify you is considered personal data. Cyber security is an important aspect of
technology that protects networks, devices, programs, and data while also preventing illegal
access. As we know that huge amount of data is collected and stored in personal computers
and other gadgets, for this reason we have to ensure network security. Situation will go
unfavorably impact if significant data (such as monetary, personal data, government data)
When doing business, different organizations transmit delicate information over systems and
other gadgets through cyber security portrays the teaching to ensure that data and the
frameworks utilized to prepare or store it. In business world, some companies ensure data
privacy and security when companies exchange sensitive information. Cyber assaults are
considered the best dangers to national security, indeed fear-based oppression. Cyber security
13 |
Page
Privacy & Security challenges in Business:
There is a chance that recent political changes in the United States might lead to a national
privacy legislation than corporations. According to attorney Tomu Johnson of Parsons Behle
& Latimer, the recent democratic victories in the White House, the House of Representatives,
and the Senate might lead to changes to current privacy legislation (Cleary and Felici, 2015).
Businesses may also have to go back to fix any remaining data security risks caused by the
fast shift to remote work that happened in 2020. An executive of the Expedia Group, Mike
Russell, predicts that organizations would have to focus on infrastructure issues including
keeping up with the most recent software patches in order to reduce security attacks' risks.
14 |
Page
Analysis and Discussion
Here, I will discuss about the threats that businesses faced during pandemic.
infrastructure.
Cyberattack packages are being tested and developed on a wide range of businesses
by script kiddies.
The hackers are aware that the present data security methods are "not fit for purpose"
Cybersecurity, 2022).
To prevent the privacy and security threats in businesses during COVID19 pandemic, in the
In order to prevent low level of privacy and security attacks, employees should use
on Cybersecurity, 2022)
15 |
Page
Employees should be aware when receiving emails.
In this section, I will discuss about the benefits and challenges of a private internet local to
U.K. Since internet's beginnings and expansion, U.K. has been involved with it. U.K. has
provided private internet in residential and commercial areas through variety ways such as
16 |
Page
No monthly fees
Can be Customized
Better control
Limitation of Bandwidth
Collaboration tools
In this section, I will discuss two collaboration tools (such as ProofHub and Zoom) in the
below:
ProofHub:
ProofHub is a virtual collaboration tool and software. It has all essential features and by using
Uses of ProofHub:
People use this for the group project, where the project break into tasks and those tasks
divided in group members. By using Kanban boards, people can see the tasks moving through
17 |
Page
different stages of the project and with the help of grant chart, people can see are the tasks
ProofHub's Advantages
Delivering Features
Unlimited users
ProofHub's Disadvantages:
18 |
Page
ProofHub’s impact in business during pandemic
Organizations had managed remote employees during the pandemic. It was essential for the
employees to keep in touch with their teams. ProofHub is an easier collaboration tool that
communicate crucial information to one another in a timely manner, both sending it and
receiving it. The managers of the large projects made use of Kanban boards to break the
projects down into various phrases and then allocate those phrases to the appropriate teams.
The Grant chart is just another incredible tool that can be found in ProofHub. The manager
was able to keep an accurate record of the working hours thanks to the grant chart. ProofHub
allowed the majority of those firms to continue to make a profit despite the economic crisis.
Zoom
Uses of Zoom: Zoom is utilized for a variety of purposes, including but not limited to the
hosting of webinars, virtual meetings, video demos, video conferences, and online training.
Zoom's Advantages
High Pricing
Few features
The COVID-19 pandemic, which resulted in an economic slump, compelled all of us to
devise innovative strategies to carry out our jobs to protect the general population. In order to
maintain continuity, many individuals have turned to collaboration tools; among these
resources, Zoom is one of the solutions that let people work from home. Zoom commissioned
the Boston Consulting Group (BCG) to conduct a survey and economic analysis to evaluate
the economic impact of remote work and video communications solutions during the
pandemic. The survey focused on what industries were able to pivot their business processes
using video conferencing, resulting in business continuity and even growth during a time of
significant economic turmoil. According to a poll conducted by BCG in 2020, it was found
that managers are more receptive to flexible remote working models than they were before
the epidemic. The survey was conducted with managers in the year 2020.
20 |
Page
Conclusion:
Creating, storing, transmitting, and sharing information are all integral components of ICT.
During the COVID19 epidemic, the business sector gains enormously from the use of
communication with their colleagues; however, with the assistance of collaboration tools,
employees are able to interact immediately with one another. During the COVID-19
outbreak, the majority of dangers to both security and privacy have gotten increasingly
severe. Hackers are improving techniques and create new malware, and target business
organizations so that they can get benefits in this situation. Stuffs should have to maintain
strong cyber hygiene in their devices as they work from home during this crisis. It is
imperative that companies strengthen their IT departments in order to protect their privacy
and security.
21 |
Page
Reference List
Cleary, F. and Felici, M., 2015. Cyber Security and Privacy. Cham: Springer International
Publishing.
<https://www2.deloitte.com/ch/en/pages/risk/articles/impact-covid-cybersecurity.html>
Hudson, B., 2002. Information & communication technology. 3rd ed. Chichester: Liberty
Hall.
Kara, A., 2017. Private-to-private communications over the internet. Computer, 37(5), pp.53-
59.
Linthicum, D., 2018. Approaching Cloud Computing Performance. IEEE Cloud Computing,
5(2), pp.33-36.
<https://www.projectpractical.com/proofhub-review-pros-cons-must-read-before-purchase/>
Wallace, V., 2021. Dig into Information Literacy with Tools of Collaboration. IASL Annual
Conference Proceedings.
Wheeler, A. and Michael Winburn, 2017. Cloud Storage Security. 6th ed. Elsevier Science.
22 |
Page