Verified Document

Internet-Based Conferencing Information Technology Has Term Paper

Web conferencing, though it is a very effective tool has its own drawback. The lack of human element and the absence of nonverbal feedback, particularly when dealing with clients constitute the negative side of electronic communication. The field of medicine is one that uses web conferencing to great success. Telemedicine success stories are a good indication of the useful application of web conferencing. Web Conferencing, for example allows physician assistants and nurses to consult physicians and experts pertaining to patients symptoms and start appropriate treatment method for patients in hospitals and health care units running in remote locations. Similarly educational institutions embrace the technology offering e-learning modules for students from geographically diverse areas.

With careful planning and implementation of access privileges for different group of end-users internal security concerns can be allayed. Sensitive information can thus be protected by authorization. VOIP security concerns are a deterring factor as time and again hackers try to identify new vulnerabilities of the VOIP networks and attack them. [Johna Till Johnson] With most companies using web conferencing and live online meetings to share their applications and other sensitive data pertaining to their enterprise it becomes imperative to address the security concerns. Application sharing, which is one of the main features of the web conferencing software, exposes the system to potential hackers. Most big companies try to circumvent security breach problems involved in web conferencing by building their own web servers. However, such a solution is not feasible for small companies, considering the high costs associated with internal conference servers. One of the main hindrances, particularly for small sized companies is the hefty fee that service providers charge. Further, the use of remote control functionalities pose a significant risk as the possibility of identity theft or compromised authentication procedure implies a huge threat for the enterprise. These concerns aside, companies have to deal with a wide array of options which they have to carefully study before choosing the appropriate technology for their needs....

offer features that may not be required for small organizations. [Matt McKenzie]
Conclusion

It is clear that Internet-based conferencing is an indispensable business tool offering a clear increase in ROI. The benefits of conferencing could be maximized when conferencing allows and encourages effective collaboration between the members within an organization. Since such collaboration involves sharing of applications between the remote locations security issues become predominant. Prompted by these concerns companies are hesitant in enabling complete collaboration. As becomes clear from the Cisco example, where the interactive component is very limited, (not full scale collaboration) web conferencing can become less effective as a productivity tool. Further, standardization of software and hardware are other conditions that are to be addressed (in huge corporations like Cisco) if computer-based conferencing to be very effective. It goes without saying that Internet-based conferencing is a highly effective and indispensable tool for businesses. A carefully planned and implemented web conferencing system with enough security precautions would definitely produce considerable cost savings and increase the efficiency and productivity of the business.

Bibliography

1) Matt McKenzie. Five Web Conferencing Packages: Not Just Conference

Calls Anymore. NetworkComputing.com Dec 1, 2005 http://www.networkcomputing.com/showArticle.jhtml?articleID=174403432

2) Kelly Jackson-Higgins. Video IP Project Boosts Network's Profile: A Look at Cisco Media Network. NetworkComputing.com Apr 19, 2004 http://www.networkcomputing.com/showitem.jhtml?docid=1508centerfold

3) Kelly Jackson-Higgins. Concrete Company Trades Travel for Web

Meetings: Bye, Bye Frequent Flier Miles NetworkComputing.com, and Aug 11, 2005 http://www.absolute-sway.com/web-conferencing/Disadvantages_of_Web_Conferencing.html

4) Johna Till Johnson, "VOIP Security Concerns cannot be Ignored," Networkworld.com,

Aug 08, 2005 http://www.networkworld.com/columnists/2005/080805johnson.html?fsrc=rss-security

Sources used in this document:
Bibliography

1) Matt McKenzie. Five Web Conferencing Packages: Not Just Conference

Calls Anymore. NetworkComputing.com Dec 1, 2005 http://www.networkcomputing.com/showArticle.jhtml?articleID=174403432

2) Kelly Jackson-Higgins. Video IP Project Boosts Network's Profile: A Look at Cisco Media Network. NetworkComputing.com Apr 19, 2004 http://www.networkcomputing.com/showitem.jhtml?docid=1508centerfold

3) Kelly Jackson-Higgins. Concrete Company Trades Travel for Web
Meetings: Bye, Bye Frequent Flier Miles NetworkComputing.com, and Aug 11, 2005 http://www.absolute-sway.com/web-conferencing/Disadvantages_of_Web_Conferencing.html
Aug 08, 2005 http://www.networkworld.com/columnists/2005/080805johnson.html?fsrc=rss-security
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Technology: Telemedicine Solutions Offered
Words: 9778 Length: 36 Document Type: Research Proposal

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used

Technology Presentation Information Technology Cannot
Words: 3110 Length: 10 Document Type: Thesis

We agree that people still purchase books. The reason is that today the author gets paid upfront and if people do not read the book, the publisher has to bear the loss. Secondly publishers are able to 'sell the books' to the bookstores' based on 'consignment system', whereby the 'book store' is able to return the books which are unsold against a 'full refund'. (Grossman, 2009) Jeanie Comstock (2009) says

Communication and Information Technologies That Help E-Commerce
Words: 1043 Length: 3 Document Type: Essay

communication and information technologies that help e-commerce firms to perform work in a virtual work environment. The paper adopts the approach of a consultant tasked with performing SWOT analysis of Amazon. Based on the SWOT analysis of Amazon, the report recommends that the company should adopt DIVA, a group-ware communication and collaboration tool proposed by Sohlenkamp and Chwelos (1994). The model will help Amazon compete with the new e-commerce

Technology in Training of Employees in What
Words: 2516 Length: 8 Document Type: Essay

Technology in Training of Employees In what ways has technology impacted the way(s) we train employees? The changing nature of the workplace environment brings with it a vast field of challenges in the organization. The aspect of the change being rapid makes the situation require adverse and quick reaction from organizations to ensure they remain on course towards their objectives. Thus, rapid change in the workplace brings with it the necessity for

Internet Business Plan What Does
Words: 7291 Length: 15 Document Type: Business Plan

(Horticulture and the advantages of using the Internet Technology) What are the disadvantages of conducting business, large or small, on the Internet? They may be many. However, the most important disadvantages are: it can actually create a feeling of isolation; the businessman may feel that he has become isolated. This means that he may get the feeling that the World Wide Web is faceless and emotionless, and thus the business

Internet Business Proposal & Implementation
Words: 5406 Length: 15 Document Type: Term Paper

With the widespread use of such technologies, we require greater understanding of the personal and social attributes that affect why people use computer-mediated communication (CMC) and the outcomes of CMC-related behavior." (Papacharissi & Rubin, 2000) Barriers and Issues The most fundamental concern in the refurbishment building's networking and VoIP proposal is also the industry's most basic barriers to accomplishing the goal of networking success. In other words, instituting a highly efficient

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now