logo

Business Law and Technology Article 2022

   

Added on  2022-09-16

5 Pages1212 Words17 Views
Running Head: BUSINESS LAW 0
Business Law
Student Details:
Business Law and Technology Article 2022_1
BUSINESS LAW 1
In today’s competitive business world, information technology (IT) enables
companies to increase their business operations which affects their decision-making strategies
and improves their overall effectiveness. There are various IT best practices which a
company should comply with in order to mitigate key risks which they face while relying on
these pratices and changing business environment. The objective of this paper is to analyse
two articles on information systems (IS) best practices which can assist companies in
avoiding IT security risks and evaluate their impact on decision making strategies. The first
article is “Innovation research in information systems: A commentary on contemporary
trends and issues” written by Ashish Kumar Jha and Indranil Bose, and the second article is
“The dark side of information technology use” written by Monideepa Tarafdar, Ashish Gupta
and Ofir Turel.
While using information systems in businesses, there are various risks that companies
must be aware about in order to properly manage their business operations. These risks
include cyber security threats, data breach, inefficient transfer of data, time consuming
decision-making and others. Jha & Bose (2016) provided that use of information systems
enables companies to innovate their business operations which allow them to stay relevant in
changing business environment; privacy is a key threat which affects organisations while
using IS that can be addressed by the implementation of best practices. The benefit of using
IS is seamless connection between different departments that can be located in various
countries which contributes to effective decision making and it also led to fostering a culture
that reinforce innovation in the workplace. Jha & Bose (2016) highlighted this argument
through analysis of innovation life cycle which shows a direct correlation between product
innovation and ICT innovations in emerging economies that leads to development of better
products. However, reliance on IS makes a company vulnerable towards cyber-attack which
lead to breach of sensitive organisational data that can harm its reputation or market share.
Cyber criminals could hack into information systems used by organisations in order to collect
their data to use it in order to gain unfair advantage. In next five years, the number of cyber-
attack cases is likely to increase because as per estimation, these attacks can cost
organisations $6 trillion by 2021 globally (Roth, 2020). Therefore, it is important that
companies must rely on strategic analysis decisions to watch out the key threats in the IT
field and decisions which they have to take in order to reduce the negative impact of these
crimes.
Business Law and Technology Article 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security For Businesses
|7
|1440
|19

Secure the Network from Common Threats and Attacks
|9
|2638
|334

Spectre and Meltdown vulnerability
|16
|4298
|33

Cyber Security Management: Case Study: Australian Red Cross Blood Service data breach: The value of good communications
|8
|1431
|372

Challenges in Cyber Security For Business
|18
|4370
|325

Cyber Security and its Impact on IoT and Social Media
|5
|929
|287