Unified Messaging System and Communication Security Report (Assessment)

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

The Unified Messaging System

The unified messaging system is traditionally defined as a messaging system, which allows keeping all the incoming messages in a single box. As a rule, the subject matter is defined as the “service that makes several forms of communication available from a single user interface” (Dean, 2014, p. 444). In other words, it does not technically unify all the information elements that users receive over a specific time period, but, instead, stores them in a single location.

UMS serves as an efficient means of protecting the users’ data from being stolen. Particularly, the information pieces such as faxes, recordings, etc., are sent to the user’s personal e-mail. Moreover, the system in question may be accessed from a phone; in the case in point, the text messages received are converted to audio and then played to the user as the latter dials the corresponding number. It should be noted that the specified approach, though clearly being rather efficient, also has its problems as far as the data analysis is concerned. To be more exact, the system in question does not presuppose a classification of the incoming messages and, therefore, impedes the process of data analysis by piling the data without any classification thereof (Kim & Solomon, 2013).

Nevertheless, the tool in question can be deemed a rather efficient in terms of information security. While it does pose certain obstacles to the data analysis and requires that the information should be sorted by the user, it offers a solid security of personal data. Additionally, its ability to incorporate several communication forms is quite impressive and useful.

Trade Press vs. Academic Sources: Comparison

Though Wikipedia offers a fairly honest and detailed description of a range of phenomena, it is typically viewed as lacking credibility and generally non-trustworthy. The specified attitude can be explained by the fact that the articles in Wikipedia can be edited by anyone. Consequently, the chances of articles vandalism and the resulting retrieval of the incorrect information become dangerously high. However, the references to the articles put on Wikipedia can often be defined as credible sources. The difference between the less trustworthy sources, such as the articles emerging in a trade press, and the ones coming from business journals or peer-reviewed journals, is drastic. First and most obvious, the unbiased approach adopted to address the subject matter tackled in the article should be mentioned as one of the essential characteristics of business articles or scholarly resources, as opposed to those published in magazines and less credible databases.

However, while trade publications may have biases and take the viewpoint that can be defined as somewhat biased, they still have a lot in common with peer-reviewed articles in the structure, the way, in which they support their argument, and their goals, Indeed, both resources provide a background for a certain phenomenon, carry out an analysis thereof with the help of certain tools, and provide an account of their study. Moreover, both types of resources use statistical data and interviews to support the point that they try to make. Finally, both scholarly articles and trade ones aim at convincing their readers that a certain decision is appropriate for a particular conflict or problem.

UM or UC Capabilities: Reducing and Eliminating Organization Hazards

The strengths of the UM and UC systems are quite obvious. Creating a single password-protected database, one reduces the risk of the company’s’ data breach Consequently, the safety of not only the information concerning the firm’s transactions but also the staff’s personal data, including the financial one will be comparatively safe. Hence, the tools in question can be deployed as the means of enhancing the company’s security and the safety of the staff’s personal data, such as the numbers of their credit cards, their passwords to various services, etc. (Bradley & Shah, 2012).

In addition, the fact that the specified system allows for increased rates of openness and clarity in an organization should be brought up. Particularly, the UM system makes it possible for all members of the company to view the information transferred from one participant to another. As a result, it becomes nearly impossible to conceal any piece of information from any member of the organization. The fact that the company’s data will be exposed to every single employee will become a constraint factor for possible frauds to occur.

Finally, the introduction of the unified communication mechanism to the process of exchange between the software and the hardware elements of a system is likely to affect the transfer of data in a positive manner by affecting its independence: “This communication mechanism provides transport independence, and, therefore, it is portable to different agent-based real-time systems without significant modification to both the software and hardware” (Yang, Syukur, & Loke, 2012, p. 419). Thus, though clearly having their problems, the UC and the UM systems might be incorporated into the operational design of modern entrepreneurships as an additional tool for facilitating the safety of the company’s and the staff members’ data.

Reference List

Bradley, T., & Shah, S. (2012). Unified communications for dummies. New York City, New York: John Wiley & Sons.

Dean, T. (2014). CompTIA network+ 2009 in depth. Boston, Massachusetts: Cengage Learning.

Kim, D., & Solomon, M. G. (2013). Fundamentals of information systems security (Information systems security & assurance) (2nd ed.). Burlington, Massachusetts: Jones & Bartlett Learning.

Yang, L. T., Syukur, E., & Loke, S. W. (2012). Handbook on mobile and ubiquitous computing: status and perspective. New York City, New York: CRC Press.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, July 4). Unified Messaging System and Communication Security. https://ivypanda.com/essays/unified-messaging-system-and-communication-security/

Work Cited

"Unified Messaging System and Communication Security." IvyPanda, 4 July 2020, ivypanda.com/essays/unified-messaging-system-and-communication-security/.

References

IvyPanda. (2020) 'Unified Messaging System and Communication Security'. 4 July.

References

IvyPanda. 2020. "Unified Messaging System and Communication Security." July 4, 2020. https://ivypanda.com/essays/unified-messaging-system-and-communication-security/.

1. IvyPanda. "Unified Messaging System and Communication Security." July 4, 2020. https://ivypanda.com/essays/unified-messaging-system-and-communication-security/.


Bibliography


IvyPanda. "Unified Messaging System and Communication Security." July 4, 2020. https://ivypanda.com/essays/unified-messaging-system-and-communication-security/.

Powered by CiteTotal, easy citation generator
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1