• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Information Technology in a Global Society - article commentary "What are the security risks of employees using mobile devices in their workspace?"

Extracts from this document...

Introduction

International Baccalaureate Information Technology in a Global Society Portfolio -1 What are the security risks of employees using mobile devices in their workspace? (Business and Employment) April 2010 Word Count: 994 Article: Inderscience. "A Portable Security Risk."ScienceDaily 31 March 2010. 14 April 2010 <http://www.sciencedaily.com/releases/2010/03/100331081133.htm>. Table of Contents: Criteria A Presentation of the Issue .............................................................. p.3 Criteria B The IT Background of the Issue........................................................p.4 Criteria C The impact of the issue ...............................................................p.6 Criteria D A solution to the problem arising .....................................................p.7 Works Cited ...............................................................................p. 8 News Article: A Portable Security Risk ...............................................................p. 9 Criteria A: Presentation of the Issue Costumers are easily convince in buying new mobile device such as media players, flash drives and smart phones, for work and entertainment, because of their many unique features and many helpful applications. According to a global survey more than two thirds of all cooperation allows employees to bring in personal mobile devices to work, this trend is expected to increase. (SC Magazine, 2010) The used of these devices may be helpful and keep employees motivated and help them stay connected with business contacts and friends and family in case of emergency. (MobilePhonesAndSafet) Also it's an easy and quick way to connect to the internet and write emails anywhere and anytime when it's necessary, so you won't need to be at the workplace all the time. ...read more.

Middle

But there are many seriously issues that comes with it. When hackers hacked into the phone, using Bluetooth, GPS or the internet on that device to obtain the phone number if the device is a cell phone allows them to make calls and have it charged to your account, and also steal information in the device, like taking the contacts information on the phone. (Hacking Alert, 2009) Many important contacts and other data may be present in that device, if there are business contacts, that business could lose valuable information about their client. Flash drives or other USB devices that could be connected to other device such as computers in a workplace, when the USB is connected, if that USB device contains virus or malware it could now travel into that computer. If it is indeed a computer at workplace confidential information may be lost. This could mean the possible lost of millions of dollars for that business. (SC Magazine, 2010) Smartphone and MP3 can be a great distraction to the employees. While using Smartphone employees could easily get side tracked and would lose all focus on their work for hours. Even though MP3 and most Smartphone could provide music for the user to help keep the 'calm' it could sometimes be distracted for them, and they would become less productive. ...read more.

Conclusion

However, the widespread use of personal data storage devices is an ever-present risk for management to lose control over the flow of business and non-business information into and out of the enterprise. The researchers suggest that there are several measures that an organisation might take to remove undue risk. First, and perhaps most draconian is simply to ban personal storage devices from the workplace. Such an approach might be appropriate for staff employed in roles where communications and access to information are not required, but likely to be unworkable for members of a sales force, for instance. Less severe would be to limit the applications and connectivity allowed on mobile devices from a central position of control. A more holistic approach would be to give staff security training, to ensure devices are used securely; however, this does not preclude malicious use or theft. The team points out that many of the risks associated with personal storage devices are not new. However, the speed of adoption and ubiquity in the workplace of such devices, coupled with increasing sophistication and consumer willingness to adopt advances will continue to pose threats to business security. "Vendors are seeking to develop products that assist organisations to discriminate between legitimate and illegitimate use of devices in compliance with organisational security policies," the team says. However, no complete solution to information leakage is ever likely to be possible. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The Effect on Music in the Christian Church

    The Bible even supports this paraphrase with a scriptural passage as found in 2 Timothy 4:3 "For the time will come when they will not endure sound doctrine; but after their own lusts shall they heap to themselves teachers, having itching ears..."

  2. English A1 HL - Detailed Plan &amp;amp; Commentary on Planting a Sequoia

    Background of the poet: "Poet, critic, and best-selling anthologist, Dana Gioia is one of America's leading contemporary men of letters. Winner of the American Book Award, Gioia is internationally recognized for his role in reviving rhyme, meter, and narrative in contemporary poetry.

  1. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Good vendors should have offline information available for consumers to study. Things like contact information, experience, reviews and when the products are from should be available for the consumers to see. 3"Know your vendor's complaint and return policy and don't be afraid to use it."

  2. ITGS portfolio Extension

    The popularity of this technology is increasing day by day and airports, hotels, restaurants are offering free Wi-Fi to attract customers and slowly Wi-Fi is replacing local area networks which require wires for connection to the internet. 5) What kind of security loopholes is a Wi-Fi network open to?

  1. &amp;quot;Night&amp;quot; Commentary

    In addition to this, the "morning star" that shone in the sky after the passing of night could be a metaphor for the flames that had consumed the part of Elie that was the student of Talmud, signifying the emptiness inside him and the feelings of the loss of faith.

  2. Take a Postition on the Global Water Crisis

    While this works very well in places that have abundant water, like America or Japan, these processes fail in places where water cannot be used for industrial uses because it is being consumed or used to grow food.

  1. Information Technology in a Global Society - Is integrity a difficulty when students use ...

    This won't help when students are doing research on school related subjects. Criteria B: IT background Wikipedia like many wiki websites uses the software call Mediawiki, there are over 2000 sites in 2009 which uses this program. [O'Reilly] The first version of the software, Mediawiki, was develop just for the

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    DCM and develops the consolidated ideas into suitable solutions that fit the specifications of the problem. New ideas may also be formed in the developing solutions stage as these may stem from the preceding hypothesis and ideas. Le Corbusier developed the basic materials, five points of architecture and the Modulor measurement concepts into solutions.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work