logo

Creating and managing digital systems: Vulnerability and dependency in the context of the information system

   

Added on  2023-06-18

14 Pages4519 Words123 Views
Creating and managing digital
systems

Table of Contents
INTRODUCTION...........................................................................................................................3
Vulnerability and dependency in the context of the information system.............................3
Protection of individual and Intellectual Property challenged by Internet:........................4
Tools that help in protection of Individual privacy of internet users..................................6
Ways that Protect Intellectual Property Rights:....................................................................8
CONCLUSION..............................................................................................................................12
REFERENCES................................................................................................................................1

INTRODUCTION
Crown Digital Systems Ltd. is a new company dealing in enterprise business and
contemporary digital innovations sector. The company deals in digitalization so it takes the
privacy and information systems of its clients very seriously. The internet technology and the
contemporary Information System technology can challenge traditional systems for protection of
data privacy. Some of the websites are not strong and does not send consent for data usage. This
report will discuss the vulnerability and dependency of IS and how this security is challenged by
the internet. It will discuss the tools that can be used for protecting IP and privacy of internet
users.
Vulnerability and dependency in the context of the information system
Information system:
It is a formal and organizational system that is used for collection, processing, storing and
distribution of information. It will act as a base that will lead to deliver the information to the
concerned person along with assistance in decision-making (Azmi and Sri 2020).
In the words of Vysotska and et al., (2019) information system includes the use of
internet technology that will assist the companies to make interaction and perform e-commerce
transaction between the customers and suppliers.
With the changing technology and its raising use, use of information system with the
context of companies including CDS-Ltd is common nowadays. This is also common as per the
meeting of trend of digitalization. On the one hand it enables the company to be well aware and
inculcate internet connection and at the same side it also makes them vulnerable and depended
on over them. This can be understood with an example that before the use of information system
every transaction is being performed by human capital but with the use of information system in
the working practice of the company along with its advantage of reduction of human errors and
raising of efficiency companies now become more depended on them. This means that along
with enabling advantages to CDS-Ltd with respect to information system, the level of
dependency and the vulnerability has increased and now the situation is like that no company
including CDS-Ltd can survive with internet connectivity and the information system in their
operation.
Likewise, it can also be understood that along with delivering the advantages and positive
aspect with respect to the information system in the context of the companies, the CDS-Ltd are

now become habitual with the use of information system. This is clear from the example that
with the use and inculcation of the media for the purpose of sharing of information, it now
became very easy for the companies to make share of information (Mir and Quadri, 2017).
Likewise, storage of bulk of information is also easy under the concept of information system.
This means that the dependency rate of the companies considering CDS-Ltd in the context of
information system has raised.
Likewise, the use and exposure of the information system has also raised the vulnerability
of the company. This is because with the use of information system there has increased risk of
threats, data loose, leak of confidential information of customers, generalization of bank and
private information and various others. This will lad to raise the vulnerability among the
companies with the use of the information system along with enabling and grabbing its
advantages.
This clearly means that the use of information system enable and deliver various
advantages with respect to companies together with CDS-Ltd in terms of raising their efficiency
and enhancing their performance. But at the same time along with raising use of information
system, companies have now started dependending upon information system and as a result their
work in the long run is being affected. Like, being a system generated outcome is far away from
the human capital and their contribution and it would also not be wrong to said that this has
raised the employees dissatisfaction and motivation which would again affect the company in
turns of raising turnover. Thus, it is again wrong from this perspective too (Wang and et al.,
2020).
Likewise, with a greater use of information system and increased rate of cyber crimes, the
percentage of vulnerability with reference to companies has also increased which also puts a
major and adverse impact towards the company's brand image and its reputation in the
competitive market.
Hence, it can right to said that although the use of information system has raised the
efficiency and company's performance but at the same time it has also affected it in the form of
raising dependency and vulnerability.
Protection of individual and Intellectual Property challenged by Internet:
Internet allows the people to imitate and copy contents and display that on their sites to
make money, which creates a big challenge for the protection of IP rights of an organisation.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Creating and Managing Digital Systems: Challenges and Solutions
|11
|3583
|102

Creating and Managing Digital Systems
|12
|3912
|393

Challenges to Protection of Individual Privacy and Intellectual Property in Digital Systems
|10
|3547
|348

Creating and Managing Digital Systems - Task 1 and [optional-Task 2 or Task 3]
|21
|4348
|450

Creating and Managing Digital Systems for Healthcare Organisations
|13
|4405
|422

MBA 610 - Management Information Systems
|7
|1394
|122