Вы находитесь на странице: 1из 7

IT impact on Business

1
1) Executive Summary
Now a day, technology has a very significant impact on human life. it influences people,
networks, organizations and the country creating exceptionally innovative effect in the
business world. Today, it has been a kind of compulsion and necessity of every business
organisation to take IT services in production, marketing, management etc. to properly
manage its functioning and growing the business effectively and to allude to a whole
industry. Information technology is the utilization of a set of computer and softwares to
oversee data (Parker and Logan, 2018). It alludes to anything identified with figuring
innovation, for example, organizing, equipment, programming, the Internet, or the general
population that include with these advances. These days’ numerous organizations have IT
divisions for dealing with the PCs, systems, and other specialized pieces of their
organizations, for example, putting away data, securing data, preparing the data,
transmitting the data as fundamental, and later recovering data as important. This is
alluded to as Management Information Services (or MIS) or Information Services (or IS).

2) Introduction
Information technology has turned out to be significant in the business world regardless of
its size, whether it is small or huge business organization. IT is observed to be beneficial
for organizations, managers and its employees by providing an increasingly proficient
administration, to ask about a specific issue, imagine its multifaceted nature, and create
new items and administrations; in this manner, improving their profitability and yield
(Meade and Islam, 2015). Telecommunication industry has a very close association with IT
and also has been benefitted as well as brought at the verge of risk the most from its
evolution. It has helped telecommunication sector to improve its services, meet customers
need, growing its business scope. But at the same time, a serious threat in the form of
data breaching has also raised which can make life troublesome and can also lead to a
huge financial as well as personal loss.
3) IT in telecommunication
The global telecom sector was never being the same as it is today. Now a day, it
addresses all aspects of our lives, and for ventures, it is the remedy of life that they
expend to live for one more day. In the meantime, the telecom business while being all
unavoidable, faces perilous issues regularly. A security rupture here and a slip there can
gouge notorieties, wreck ventures and for all time harm clients' certainty. A few reviews
throughout the years have turned out with discoveries which are disturbing, without a
doubt. According to Kochedykov et al. (2018), a worldwide consultancy significant, while
bargain of worker, client and interior records remain the top focuses of digital or
cybercrimes, harming company’s hard earned values and principles and such incidents
has expanded 81 percent in 2015.
Hence, it is even more crucial for this industry to be under 24 by 7 surveillance. This is on
the grounds that IT security episodes in the telecom division expanded 45 percent or by
about almost half in 2015 contrasted and the earlier year. What it likewise lets us know is
that exploiting network of systems was behind all security episodes, compromising
information are at the base of security ruptures.
As per Grishunin et al. (2018), there are mainly four areas where the telecom sector need
to watch themselves against:
• Breach of call information record/information rupture.

2
• Threat from outside powers and from its own workers.
• Risk of interruptions through cell phones.
• Risk from cloud based applications.

Every one of the zones are in truth connected to each other. CDR or call information
record is a significant part of security. It comprises of super-touchy data and both from a
protection perspective and lawful perspective. The telecom administrators are happy to
place their last penny on the table to keep up elevated amounts of mystery and secrecy.
Access or rather unapproved access to call information records can arm a programmer or
a contender with enough ammo to grab pack brimming with contracts directly under the
nose of a corporate substance. There are two parts of this rupture. One is simply the risk
from inside or from representatives themselves and the second is the danger from outside.
It is additionally expressed that after programmers, representatives can be the greatest
danger to security (Libaque-Saenz et al. 2016). Almost 33% or 32 percent of telecom
administrators guarantee current workers as the reason for security ruptures, and previous
representatives establish 28 percent however programmers remain the real wellspring of
stress for the administrators.
The telecom players likewise said that there has been an expansion in representative
records being undermined by more than 50 percent while that of client records grew 44
percent contrasted and the earlier year.
Another to a great extent disregarded however similarly, significant risk originates from cell
phones. As they are portable, they can get effectively lost, stolen and henceforth
information in them get traded off. Hand-held gadgets are a noteworthy wellspring of
security rupture. Be that as it may, it has not converted into any significant measures being
taken by the ventures to plug the escape clause.
Giving telecom administrations requires a huge measure of IT support. This division
spends around 5 percent of telecom income to actualize IT when contrasted with
assembling and different businesses utilizing just 2 percent of their income on this. In
telecom division, complex and always showing signs of change levy structure requires IT
administrations to diminish unpredictability, rating and charging purposes. Ongoing
procedure, for example, charging of supporters require a completely robotized IT
procedure chain. Additionally, IT has turned into an essential piece of telecom items and
benefits and will keep on being in future.
With the advancement in IT and web based services structures (PCs, phones and
programming), institutions got the opportunity to emerge from a local small business to
international level. Inclusion of IT has to potential to sustain organizations in cutting and
lower cost, improving services, managing day to day functioning, productivity and
efficiency. According to Al-Hila et al. (2017), some of the major advantages of using IT in
telecommunication industry are as follows:
Improved communication services: Having a proper communication within an organization
is crucial for its functioning. The advancement in information technology (IT) has resulted
into improved performance in all the aspects of an organization. The inclusion of IT in has
brought some new services as well like video calling feature and organisation meetings
through conferences by using several specially designed tools for this purpose like Skype,
Zoom etc. and thus provides an extended opportunity to make collaborations. It helps in
minimizing the financial burden by eliminating the need to bring client on site or to get in
3
touch with employee working in some remote location. It also helps organisations in
analysing markets and implementing plans into practicality to get an edge over other
competitors.
Facilitating strategic thinking: The most significant advantage of IT is that it enhances the
chance of getting an edge over other competitors by improving the strategy and decision
making process. It has simplified the whole process of accessing, assembling, managing,
interpreting and transfer of data which helped in accessing customer and market needs.
Therefore, while using it as an imperative endeavour instead of as a lamentable task, IT
helps in providing affiliations and mechanism needed for properly surveying markets.
Storage, managing and protection of data: Information management is a term which is a
combination of storing, preserving and managing data. It has become crucial for
organisations to protect and preserve data for future purposes by enabling these
organizations to develop an environment for storage, sharing and backing up of
information for future perspective and also protecting highly sensitive data from any cyber
threat
Cost optimization and service improvement: At earlier stage implementation of IT in
telecommunication sector may seemed to be expensive but in long run it has proved to be
beneficial in making the process cost efficient by simplifying the operational and
management process. Organising training sessions to know about IT applications and its
use can help employees in improving their productivity.
Although inclusion of IT in telecommunication has helped this sector to revive, expand,
improving services and business structure, but it has also brought some potential risks and
challenges which if not addressed can cause serious threat to an individual. Some of the
risks associated with this are mentioned below:
With the ever changing demands, fast growing market and rapid technical advancement
has created lack of certainty about changing market and business model.
Information protection and security are of fundamental significance for organizations and
buyers everywhere throughout the world. It's significant for administrators to have an
unmistakable perspective on their job as defenders of client information.
There is a discontinuity of informational indexes, and use cases for enormous information
examination are being duplicated. This outcome in a circumstance where the systems of
numerous bearers stay at the primary phases of improvement.
A news reported by New York Times states that a Norcross based engineering firm was
charged $166,000 for their phone calls bill at the end of the week. On conducting a
detailed research on this issue it was observed that hackers have used premium rates
phone calls using their number from remote locations like Somalia, Maldives etc. This
incident is just a simple example showing the extent up to which it can be harmful for
organizations and people.
Observing an organization's whole IT condition isn't simple as it may seem to be, requiring
the most recent security advances, yet in addition the aptitude and assets to expand its
advantages. Risk checking arrangements gather and associate data from system sensors
and machines just as endpoint operators and other security innovations to distinguish
designs demonstrative of a potential danger or security occurrence. When a threat is
recognized an alarm is issued to the security group for alleviation or occurrence reaction.
4) Conclusion

4
The inclusion of IT into telecommunication has actually revolutionised this sector and has
resulted into better management, client response system, cost optimisation, improved
services and thus providing a boost to this sector to grow and expand their business. In
spite of all these benefits it has also raised some challenges and security issues which has
the potential to create some serious threats for user as well and companies. Thus, the
organizations operating in this sector needs to properly address all the criticalities and
loopholes to make it safer.

5
5) Reference
Grishunin, S., Suloeva, S. and Nekrasova, T., 2018. Development of the Mechanism of
Risk-Adjusted Scheduling and Cost Budgeting of R&D Projects in Telecommunications.
In Internet of Things, Smart Spaces, and Next Generation Networks and Systems (pp.
456-470). Springer, Cham.
Kochedykov, S.S., Noev, A.N., Dushkin, A.V. and Gubin, I.A., 2018, May. Method of
optimum channel switching in equipment of infocommunication network in conditions of
cyber attacks to their telecommunication infrastructure. In Journal of Physics:
Conference Series (Vol. 1015, No. 3, p. 032101). IOP Publishing.
Libaque-Sáenz, C.F., Wong, S.F., Chang, Y., Ha, Y.W. and Park, M.C., 2016.
Understanding antecedents to perceived information risks: An empirical study of the
Korean telecommunications market. Information Development, 32(1), pp.91-106.
Meade, N. and Islam, T., 2015. Forecasting in telecommunications and ICT—A
review. International Journal of Forecasting, 31(4), pp.1105-1126.
Parker, R.M. and Logan, J.L., AFFIRMED NETWORKS Inc, 2018. Database based
redundancy in a telecommunications network. U.S. Patent Application 10/154,087.
Al-Hila, A.A., Alhelou, E., Al Shobaki, M.J. and Abu Naser, S.S., 2017. The Impact of
Applying the Dimensions of IT Governance in Improving e-training-Case Study of the
Ministry of Telecommunications and Information Technology in Gaza
Governorates. International Journal of Engineering and Information Systems
(IJEAIS), 1(7), pp.194-219.

6
7

Вам также может понравиться