Threats that establishments must mitigate regarding sharing information in a global economy.doc - Threats that establishments must mitigate regarding

Threats that establishments must mitigate regarding sharing information in a global economy.doc

This preview shows page 1 - 2 out of 3 pages.

Threats that establishments must mitigate regarding sharing information in a global economy The global economy at its core institutes the various economic interactions between a community of nations. The various establishments involve the government, private enterprise, and public corporations among others. The development of new technologies especially the refined information and communication technologies has greatly affected the operations of the various establishments in the global economy. Establishments such as financial markets for instance, are establishing their presence in the goods and services market due to technological advancements. Additionally, corporations and interlinkages between organizations in various geographical locations have greatly increased due to technological developments that enhance sharing of information ( Arvis et al. 2018 ). However, information sharing among various players of the global economy faces various threats because the technological infrastructure used in the process of sharing crucial business information among trading partners is subject to manipulation and various security threats from outsiders. Although the developments of information technology infrastructure have enhanced the process of sharing information between trading partners, these establishments, however, are faced with the great threat of fraud and harassment. Owing to the fact that outsiders can hack into databases of various business corporations and obtain crucial information, personnel of various organizations are facing the risk o engaging in fraudulent business activities or being harassed. Several business organizations use various technological infrastructures to store critical information about their businesses. Sensitive information about public corporations are stored using various technological platforms such as cloud computing. These kinds of information can be accessed and used by outsiders to benefit their personal interests. Additionally, business rivals may access sensitive information about their competitors from various online platforms that they can use to cause harm to other establishments ( Gupta, Agrawal, & Yamaguchi, 2016 ). Accordingly, the development of information technology infrastructure enables
Image of page 1

Subscribe to view the full document.

Image of page 2
  • Fall '19
  • Sophie Bowerman

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes