Order Now

Networked Virtual Environment

In actuality, the development of modern technologies contributes to consistent changes in the development of the modern business and society at large. In this regard, the development of the Networked Virtual Environment plays a particularly important role because it contributes to consistent changes in the development of social relations as well as it stimulates business development. At the same time, it is worth mentioning the fact that the development of Networked Virtual Environment has a huge potential because it changes social relations and contributes to the broader communication between people. On the other hand, the emergence of Networked Virtual Environment raises a number of problems because the development of Networked Virtual Environment increases the risk of the unauthorized access to private information, data and other problems, such as identity theft (Peters, 2002). In addition, the progress of Networked Virtual Environment raises the problem of the further technological progress and introduction of innovations in modern organizations and adapt their workplace environment to new needs and introduce new technologies to catch up with the existing technologies and technological progress (Peters, 2002). In such a context, Networked Virtual Environment needs to meet new challenges and requirements of the modern society in the contemporary environment to introduce new technologies and to adapt to the changing environment as well as to develop effective strategies and tools to meet new challenges such as the protection from the unauthorized access to private information, identity theft and other problems.

Problem statement

In actuality, the development of Networked Virtual Environment raises a number of problems because the development of networks contributes to the consistent change in the communication. At the same time, the emergence of networks raises numerous challenges associated with the development of new technologies, such as the development of wireless networks. In fact, the emergence of new technologies raises the problem of the adaptation of users to new technologies as well as the compatibility of old technologies with new ones (Faust, 2000). At the same time, the fast introduction of new technologies makes it difficult for users to keep pace with the progress of technologies (Faust, 2000). In such a way, the development of Networked Virtual Environment changes the traditional environment and people and organizations have to adapt to the new environment and introduce new technologies as well as to learn how to use them in their regular life (Faust, 2000).

Therefore, the major problems associated with the development of Networked Virtual Environment and new networks impose new challenges on the society and average users. They need to adapt to technological changes and to new environment created by networks. In fact, networks lead to the formation of new social relations, whereas the introduction of new networks, such as wireless networks, increases the problem of the adaptation of people to technological changes (Peters, 2002). In such a context, the problem of training of users arises because they need to get efficient training to be able to use the full potential of new technologies and new networks, such as wireless networks for instance.

Literature review

Today, the development of information technologies and modern telecommunication systems contributes to the fast business development and introduction of innovations in the field of IT and telecommunication systems which allow users to get larger opportunities for using their PCs, laptops, and mobile phones (Faust, 2000). In recent years, the emergence of information technologies and telecommunication system contributed consistently to the rise of the mobile phone market and, today, mobile phones tend to replace conventional PCs and compete with laptops in the modern telecommunication and IT market (Faust, 2000). At the same time, the emergence of mobile phones raises the problem of the development of the effective software to maintain their stable functioning and to provide users with the access to internet services and IT technologies via their mobile phones (Peters, 2002). In such a situation, many information providers (IPs) attempt to reach their target audience through mobile phones and other mobile devices (Peters, 2002). They may face substantially difficulties while reaching their target audience because mobile phones and other mobile devices are quite different from conventional PCs and, therefore, need the adaptation to make the information provided by the IP, for instance, concerning the local weather conditions, for users online via their mobile phone or other mobile devices (Peters, 2002). In other words, IP providing local weather conditions can reach its target audience via mobile phones and other mobile devices but it should be aware of possible difficulties and what is more the IP should be able to adapt the information it delivers to users to their mobile devices (Peters, 2002).

At the same time, the development of information technologies and telecommunication systems stimulated the development of networks and changes in the conventional Networked Virtual Environment. In this regard, it is worth mentioning the fact that along with traditional networks, wireless networks have started to appear, which were more efficient and opened larger opportunities for users (Peters, 2002). On the other hand, the appearance of new networks increases the problem of their adaptation and implementation within organizations as well as adaption of new networks to users’ needs and skills (Peters, 2002). What is meant here is the fact that often the development of networks raises the problem of training of individuals to use the full potential of these networks.

The development of a new wireless network will need definitely a careful planning and phasing of the new wireless network. In this respect, it is necessary to lay emphasis on the fact that the development of the new wireless network and its introduction will be simultaneous with the elimination of the old wireless network. In such a context it is necessary to phase the development and introduction of the new wireless network respectively to phasing the old network in order to maintain the stable work of the network. In such a way, customers will have no inconveniences in the course of the introduction of the new wireless network and the elimination of the old one. Therefore, phasing is essential for the development and introduction of the new wireless network because it provides larger opportunities for the successful introduction of the network and convenience of customers.

In such a context, the introduction of the wireless network and its phasing should be preceded by the risk analysis. What is meant here is the fact that it is necessary to define clearly potential risks and threats associated with phasing of the wireless network. The risk evaluation is very important because the identification of risks and threats will help to define the effective ways to eliminate potential problems that phasing of the new wireless network can face in the course of its practical implementation. On defining risks, it is necessary to evaluate the extent to which they are probable and whether they can occur in the course of phasing at all. Finally, focusing on major risks and threats, it is possible to avoid the risk and implement phasing of the new wireless network successfully.

The introduction of the wireless network is likely to raise a number of problems not only in regard to technical issues, but also in regard to managerial and social issues (Bloch, M., Peigneur Y. & Segev, 2001). In this respect, it is possible to distinguish the major challenges of the wireless network introduction, including planning and phasing of the wireless network, training of the personnel and preparation of the introduction of the wireless network and the use of the full potential of the wireless network. The planning and phasing of the wireless network are particularly vulnerable to the risk of error, especially at the stage of planning and successful introduction of the wireless network (Behzad, 2003). To minimize such risks, it is important to focus on the control of the implementation of the wireless network to identify possible errors and introduce improvements to eliminate errors and maximize the effectiveness of the wireless network.

Furthermore, human resources should be prepared and trained to work with the wireless network. In fact, professionals should be conscious of the larger opportunities of the wireless network compared to conventional network (Bovee & Thill, 2005). In addition, professionals can oppose to the introduction of the wireless network, if they are uncertain in its effectiveness or if they have problems while using the wireless network. To solve this problem, it is necessary to train the personnel and help employees to understand the full potential of the wireless network. As the matter of fact, people should understand the full potential of the wireless network to maximize the effectiveness of the use of the wireless network (Pomeroy, 2001). To meet this goal, it is possible to promote the wireless network and its potential to help people to learn how to use the wireless network.

The implementation of the wireless network is a complex process, which should be based on thoroughly developed plan. As the matter of fact, the successful implementation of the wireless network is practically impossible without planning and control over the implementation of the plan (Lucas & Baroudi, 2002). The control over the implementation of the plan is essential to introduce possible changes to avoid errors and to arrive to the overall success of the implementation of the wireless network. In this regard, it is important to lay emphasis on the fact that the implementation of the wireless network may confront not only technical problems but also organizational problems. The latter are extremely important because the poor organization can ruin even the perfect, from the technical point of view, plan. In such a way, the successful implementation of the wireless network is based on the well-developed plan and successful solution of organizational and technical problems that may arise in the course of the development and implementation of the wireless network.

In actuality, the introduction of the wireless network aims at the improvement of the organizational performance and communication because it facilitates consistently the process of communication and transmission of data as well as it increases substantially the speed of transmission of data compared to conventional network. In such a context, advantages of the introduction of the wireless network can hardly be underestimated (Kotter, 2001). At the same time, the implementation of the wireless network may raise the opposition within the organization or from the part of users, especially if the process of implementation can cause certain inconveniences for users. In such a situation, the implementation of the wireless network should start with the promotion of the idea of the importance of wireless network to users. Users should understand all the advantages and benefits of the wireless network compared to the network they have got used to use. In such a way, though explanation of all the advantages of the wireless network, it is possible to gain the support of users that is an essential condition of the overall success of the implementation of the wireless network.

The implementation of the wireless network will be carried out by the IT department, which should focus on the implementation of the wireless network and provide all the technical back-up and software essential for the implementation of the wireless network. In this respect, it is worth mentioning the fact that the introduction of the wireless network will need the development of the software and technical devices which can maximize the effectiveness of the operation of the wireless network (Bovee & Thill, 2005). In such a situation, it is possible to suggest outsourcing the development of software in order to save costs and get the product of the high quality. Obviously IT companies specialized on the development of software for wireless network will create reliable and modern software which can maintain the effective and stable operation of the wireless network for a long period of time and, thus, such companies can make the wireless network effective in a long-run perspective.

At the same time, the implementation of the network based on the technology and software developed by the IT department will make the company independent from external suppliers, but the quality of the technology and especially software can be under a question. At any rate, the technology and software developed by the IT Department of the company may need to be upgraded to match the modern requirements to the wireless network. At this point, the problem of the information protection may be one of the most serious challenges the company may face in the course of the implementation of the wireless network.

Furthermore, the introduction of the wireless network will inevitably involve the training of users. In this respect, it is necessary to distinguish primary and secondary users. The primary users are the staff, professionals, who will work constantly with the wireless network and whose professional duties inevitably involve the use of the wireless network on the regular basis. The secondary users are all the rest, i.e. users who will use the wireless network occasionally and, therefore, they do not need to have a deep knowledge of the essence and functions of the wireless network to be able to use it.

The training of the primary users should start at the stage of the implementation of the wireless network. In such a way, they will understand how the wireless network operates. In addition, they will grow confident in their ability to operate and use the wireless network as good as developers of the network do. The training can take place just right at the workplace, where users can work in the real life environment and they will learn how to cope with possible problems if they occur in the operation of the wireless network or how to use the full potential of the wireless network. As for secondary users, they can participate in the training course organized specifically for secondary users. The training course should provide users with the general information about the wireless network and develop basic skills to use the wireless network.

The implementation of the wireless network should start when the primary or key users have completed their training. At the same time, by the moment of introduction, the wireless network should be completed and tested by its developers. Through testing it is possible to identify possible flaws and errors in the functioning of the wireless network. These flaws and errors should be eliminated before the introduction of the wireless network is accomplished, i.e. when all users can use the wireless network at the full scale.

After the introduction of the wireless network, it is necessary to develop the effective system of upgrades to ensure the stable maintenance and operation of the wireless network. In this respect, it is necessary to update the wireless network at least once a quarter. In such a way, the wireless network will be updated four times a year that will allow the wireless network to keep pace with the emerging technologies and software. At the same time, update will not be too frequent that may create difficulties for users since they will need to adapt to new updates.

Finally, the wireless network should be constantly monitored and audited in order to identify possible problems or inconveniences which emerge in the course of the functioning of the wireless network. Ideally, it is necessary to audit the wireless network as frequent as possible, but, objectively the effective audit is possible twice a month because auditors will have sufficient time to analyze the results of the audit and take decisions to eliminate revealed flaws. Communications play increasingly more important in the contemporary world. The introduction of modern telecommunication technologies opens larger opportunities for the development of business, improvement of management and increase of the efficiency of the organizational performance. At this point, it is worth mentioning the introduction of wireless technologies which are successfully implemented in different industries, including chemical and car manufacturing, finance and investments, and retail. In actuality, wireless technologies provide companies operating in different industries with considerable benefits compared to conventional technologies.
First of all, it is important to underline that wireless technologies allow companies to save time and, therefore, to save costs. This trend is particularly obvious in the chemical industry. The analysis of effects of the introduction of wireless technologies in Celanese Chemicals reveals the fact that the introduction of hand-held devices and wireless LAN technology facilitated consistently the work of salespeople of the company in the field. Moreover, the introduction of these new technologies, especially the wireless technology, proved to be particularly effective in regard to speed maintenance at chemical plants of the company. In fact, the introduction of the wireless technology allowed the company saving time due to the improvement of the effectiveness of the communication between different units of the company and its plants. To put it more precisely, to convey the information throughout the plant or to control the process of the production, an employee of the company did not need to leave the workplace to contact his or her colleague or a manager, or to survey the process of production. Instead, it was sufficient to control the process of the production via wireless LAN and the communication between employees as well as between employees and manager could be effectively maintained in the same way.

The same benefits of the use of the wireless technologies could be found in the automobile manufacturing companies, such as General Motors and its Cadillac and Buick assembly plants. Along with the increasing speed of the communication and production process employees of these plants could entirely focus on their work. For instance, forklift operators increased their productivity to 60 – 70 deliveries a day that is twice as much as much as they normally did. In the contemporary business environment the increase of speed and efficiency of the production brings considerable material profits. No wonder GM estimates about $1 million savings due to the introduction of the wireless technology. In addition, it is important to enlarge the use of wireless technology and implement it on all production levels (Andrew, 2003). In such a way, it will be possible to develop management strategies, launch new projects and implement them in practice involving all specialists via wireless LAN. As a result, the realization of the project would be more effective since all professionals involved in their realization could maintain the permanent contact, consult each other and take decisions in the result of the consultation without leaving their working place and using the wireless technology.

The implementation of the wireless technology in finance and investments is also very efficient. In fact, it is even possible to estimate that the wireless technology can be even more effective in finance and investments than in manufacturing. The efficiency of the wireless technology is determined by the specificity of finance and investments. Obviously, finance and investments does not involve directly any material production. Therefore, the analysis of financial information, collection of valuable market and company data, the analysis of this information and the process of taking decision are crucial for finance and investments. All these process can be facilitated consistently through the introduction of the wireless technology since the information can be delivered in a shorter time and practically immediately. Moreover, it is possible to share the financial information with a larger of specialists concerned and, therefore, this information will be processed more effectively, while decisions taking will be more precise and carefully prepared. Today, the introduction of the wireless technology has increased the financial activity and, what is more, it facilitated the communication of companies with their customers due to the wireless technology. As a result, customers can constantly maintain contacts with their company and get information and services they need in time. But the wireless technology has larger opportunities which have been just mentioned above.

In this respect, it is possible to use the experience of the retail industry, where the wireless technology has been already implemented successfully and where this technology has been used for the longer period of time compared to manufacturing or finance and investments. The wireless technology allows retailers improve inventory accuracy, fight fraud and increase sales. Potentially, the wireless technology may be used even more effectively. For instance, it is possible to use the wireless technology for the development of customer-company relationship and reception of customers’ feedback by customer relations managers. Thus, it is obvious that the wireless technology is very effective and it has been already successfully applied in different industries but its full potential still remains undiscovered.

At the same time, specialists (Littlejohn, 2002) argue that the development of new technologies and Networked Virtual Environment contributes to the emergence of numerous threats to the safety of private data and personal information. In this regard, networks provoke the problem of the information, which often occur because of poor skills and abilities of users to protect their private information and personal data. Users are accustomed to gain the full advantage of existing technologies but they often pay little attention to security of their private information. Naturally, in such a situation, the threat of information breaches arises and users may lose important data or intruders can get access to their private information and obtain it easily using the existing network environment. In such a situation, users should be aware of existing threats and risks and be able to use preventive measures and methods of protection of personal data. In this regard, the training of users is essential for their ability to protect their private information adequately and effectively.

Therefore, specialists arrive to the conclusion that training is essential for users, at both individual level and organizational level. Modern organizations need to protect their databases as well as average users need to protect their private information from information breaches, whereas networks increase the risk of information breaches. In addition, progressing networks and new computer technologies raise sheer technological problems because users should be able to use new technologies that is another evidence of the necessity of training for users, who have already started to consider networks an essential part of their social life.

Conclusions and recommendations

Thus, taking into account all above mentioned, it is important to place emphasis on the fact that training of the personnel and users is essential for the effective development of networks and computer technologies. At the same time, it is worth mentioning the fact that training of users may differ depending on the background of the users. What is meant here is the fact that average users need to attend training courses and pay for them, whereas professionals working in organizations and dealing with new networks and computer technologies can count for organizations to cover costs of training and to provide training for their employees. In this regard, organizations should be interested in the organization of training of their employees because training increases their professional level and, what is more, allows employees to use the full potential of networks and computer technologies. Therefore, organizations are interested in the organization of training for their employees to stimulate them to use new technologies and to apply them in their regular work. In such a way, employees’ performance can increase substantially that will naturally lead to the improvement of organizational performance (Hart, 2004). As for individual users, they can rely on themselves but they may organize public organizations as well as non-profit organizations, which can aim at training average users to protect them, when using networks and computer technologies.

Furthermore, organizations can use knowledge sharing management to train their personnel. In actuality, knowledge sharing management is very popular because it has a considerable potential in terms of training of employees within organizations without involvement of specialists from outside of organizations. As a result, organizations can save costs and conduct training effectively. In addition, relationships between employees improve because they develop close interaction in the course of sharing knowledge and experience. As for networks and computer technologies, professionals learn using them effectively and normally have fewer troubled compared to untrained professionals, who are not involved in knowledge sharing management programs.

At the same time, users should develop skills of independent learning without the assistance of educators. In fact, users can learn how to use new networks and new computer technologies. They cannot always do it without the assistance of educators and trainers (Viardot, 2001). On the other hand, they cannot always afford educators and trainers to learn how to use a new network or computer technology. In such a situation, users should develop skills, which help them to learn how to use new technologies and networks without the external assistance.

In this regard, users should try new technologies to expand their experience. In fact, through expansion of their experience, users can get the full advantage of new technologies and they can grow confident in their ability to use new technologies and networks as well as they can elaborate a system of how to try and start using new technologies or networks. In such a situation, developers of networks should create user-friendly information systems with the high level of users’ protection that will facilitate users learning and make using networks and computer technologies easier. Finally, legislative changes have to be introduced to enhance the protection of users and legal liability for cyber crimes, especially if they relate to Networked Virtual Environment. Legislative changes are essential because they contribute to consistent improvement of relationships between developers of networks and computer technologies and users because each party is responsible for its actions and policies.

 

References:

Andrew, S. (2003). Computer Networks. (4th Ed), Prentice Hall.
Behzad, R. (2003). Principles of Data Conversion System Design. New York: Random House.
Bloch, M., Peigneur Y. & Segev, A. (2000). “Leveraging Electronic Commerce for Competitive Advantage: a Business Value Framework.” The Ninth International Conference on EDI-IOS, Bled, Slovenia.
Bovee, C.L. & Thill, J.V. (2005). Excellence in Business Communication. Prentice Hall.
Faust, M. (Oct. 20, 2000). “Three Tips for More Powerful Presentations.” The Small Business Journal. Synergy Publishing Ltd.
Hart, J.L. (2004). “Organizational Communication in an Age of Globalization: Issues, Reflections. Practices”. Business Communication Quarterly, Vol. 67.
Kotter, J. (2001) “What Leaders Really Do!” Harvard Business Review, Boston. Volume 79.
Littlejohn, S. W. (2002). Theories of human communication. 7th edition, Belmont, CA: Wadsworth.
Lucas, H. & Baroudi, J. (2002). “The role of Information
Technology in Organization Design.” Journal of Management Information Systems, vol. 10(4), 45-52.
Peters, T. J. (2002). In search of excellence: Lessons from America’s best-run companies. New York: Harper & Row.
Pomeroy, B. (02 March 2001). “Networking: There’s Still Cream in the Middle “Infomediaries” Find a Niche on the Net”. High Technology Careers Magazine.
Viardot, E. (2001). Successful Marketing Strategy for High-Tech Firms. New York: New Publishers.