• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Home working is a key revolution in business and technology industry and is becoming even-more popular for the enterprises. Home working or remote working allows employees to expand their day and increase productivity.

Extracts from this document...


International Baccalaureate Information Technology in a Global Society Portfolio (1) HOME WORKING "Boon or Bane" Business and Employment News item: BBC News.2009, BT pulls plug on home workers, http://www.managementtoday.co.uk/News/MostEmailed/908688/bt-pulls-plug-homeworkers-does-it/ Date: 27th May 2009 Presentation of the issue Home working is a key revolution in business and technology industry and is becoming even-more popular for the enterprises. Home working or remote working allows employees to expand their day and increase productivity. It offers many benefits for the business. It firstly reduces office administration costs1, staff management cost and property costs. Remote working is proven to be more sustainable as it eliminates the number of employees commuting in to the office. However, there are many potential costs linked with home working. Businesses face complexity in managing home workers and monitoring their performance. There is a risk of information security problems. This is the main issue the British businesses, as remote working increases it becomes difficult to control and monitor the employees, posing financial threat to the businesses. Security concerns also arise with file sharing, as it opens tunnels through firewalls. ...read more.


Email allows businesses and employees to send documents, pictures and other data from one part of the world to another within a second. Video conferencing is very recent. It involves user in different places communication using both video pictures and voice. It requires hardware like loudspeaker, television, projector, monitor, microphones, webcam, and video camera. Another technology that is growing is VPN (virtual private network). Businesses use it as a means of extending their own networks, by connecting sites or user together. First came intranets; now many companies are creating their own VNP to accommodate the needs of remote employees and distant offices.'4 Employees working from home would usually set up a configured office with a dedicated PC and telephone. They could use is ISDN dial-up for remote IT system access and call forwarding. IP solutions are becoming more attractive with the launch of unmetered services and higher bandwidth and these are likely to offer better performance and lower costs. Impact of the issue Home working is proven very cost-effective and efficient, such as saving the fixed costs of the business and cutting down on the utility costs. ...read more.


Problems related to data security mostly arise when the employee working from home use their work computer for personal purposes. Solutions to problems arising from the issue To avoid Security breaches, that leads to financial loss, it's best to provide staff with a computer and install anti-virus and firewall software on the employee's computer. Company can also use password and user name to access control to their computers and to the business's network. Monitoring home based employees is a big challenge. Now that British Telecom, is moving 200 workers back to office, strict surveillance measures should be adapted: ? Computer Monitoring ? Telephone Monitoring ? Video Monitoring BT can use 'chip-and-pin' technology to authenticate users and encrypt USB devices, so when they are lost, they cannot be accessed by any unauthorized person. Another solution is to have a remote desktop that doesn't require VPN connectivity. This protects the user, while also allowing updates to be downloaded when connected to the internet. VPN should have network access control, allowing BT to isolated devices which are not up-to-date. It will allow access to systems such as e-mail, but withhold access to important files and servers. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    employers tend to take information regarding health into account, therefore, threatening the client's privacy. The use of communication systems can also cause loss of employment and loss of human touch. With the establishment of eRx, pharmacists are no longer required to communicate with clients because, prescribed medication can go right to the door of the client.

  2. Databases Portfolio

    Criterion D (Solution to the Problem Arising from the Issue) Thus, in order to make the best out of this new information storing technique; alternative solutions must be found to either reduce or overcome the issues that are associated with using the DNA database.

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    security issues because customers are no longer entering their credit card number into the computer. Lower the chances of privacy issues arising would also limit the chance of identity theft. By entering the credit card number on the Internet, it will automatically put the user at risk because the theft

  2. Information Technology in a Global Society - article commentary "What are the security risks ...

    This is extremely dangerous if the lost data are important. (Inderscience, 2010) In 2009 the first iPhone worm was discovered, and it is believe that such malware would only be increase in the up coming years. (Mobile Phones And Safety, -)

  1. Uses of Encryption

    The export-controls didn't achieve this goal because encryption programs that were even stronger than those made in the U.S.

  2. Censorship of Video Games

    politicians continued to attack video games, proposing to ban video games completely that they considered immoral. What this would mean is that these games would be taken completely off shelves and it would be near impossible for anyone to purchase them.

  1. According to the standards within the Ln Yu, has the Confucian gentleman survived to ...

    and bad in society and thus acts upon it, falling under the acknowledgement of any of the Confucian virtues can be realized from the act of humility to then be humbled as well as implementing the others. Courage is imbued within humility as well through acceptance; In magnanimity as the

  2. Guterson's Snow Falling on Cedars

    For example, the self-contained characters were adversely affected by a war which they fought and died for, yet the incidence of war had no immediate concern with the island community. The lyrical and evocative descriptions of San Piedro convey the nature of the members of the community.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work