• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Information Technology in a Global Society - article commentary "What are the security risks of employees using mobile devices in their workspace?"

Extracts from this document...

Introduction

International Baccalaureate Information Technology in a Global Society Portfolio -1 What are the security risks of employees using mobile devices in their workspace? (Business and Employment) April 2010 Word Count: 994 Article: Inderscience. "A Portable Security Risk."ScienceDaily 31 March 2010. 14 April 2010 <http://www.sciencedaily.com/releases/2010/03/100331081133.htm>. Table of Contents: Criteria A Presentation of the Issue .............................................................. p.3 Criteria B The IT Background of the Issue........................................................p.4 Criteria C The impact of the issue ...............................................................p.6 Criteria D A solution to the problem arising .....................................................p.7 Works Cited ...............................................................................p. 8 News Article: A Portable Security Risk ...............................................................p. 9 Criteria A: Presentation of the Issue Costumers are easily convince in buying new mobile device such as media players, flash drives and smart phones, for work and entertainment, because of their many unique features and many helpful applications. According to a global survey more than two thirds of all cooperation allows employees to bring in personal mobile devices to work, this trend is expected to increase. (SC Magazine, 2010) The used of these devices may be helpful and keep employees motivated and help them stay connected with business contacts and friends and family in case of emergency. (MobilePhonesAndSafet) Also it's an easy and quick way to connect to the internet and write emails anywhere and anytime when it's necessary, so you won't need to be at the workplace all the time. ...read more.

Middle

But there are many seriously issues that comes with it. When hackers hacked into the phone, using Bluetooth, GPS or the internet on that device to obtain the phone number if the device is a cell phone allows them to make calls and have it charged to your account, and also steal information in the device, like taking the contacts information on the phone. (Hacking Alert, 2009) Many important contacts and other data may be present in that device, if there are business contacts, that business could lose valuable information about their client. Flash drives or other USB devices that could be connected to other device such as computers in a workplace, when the USB is connected, if that USB device contains virus or malware it could now travel into that computer. If it is indeed a computer at workplace confidential information may be lost. This could mean the possible lost of millions of dollars for that business. (SC Magazine, 2010) Smartphone and MP3 can be a great distraction to the employees. While using Smartphone employees could easily get side tracked and would lose all focus on their work for hours. Even though MP3 and most Smartphone could provide music for the user to help keep the 'calm' it could sometimes be distracted for them, and they would become less productive. ...read more.

Conclusion

However, the widespread use of personal data storage devices is an ever-present risk for management to lose control over the flow of business and non-business information into and out of the enterprise. The researchers suggest that there are several measures that an organisation might take to remove undue risk. First, and perhaps most draconian is simply to ban personal storage devices from the workplace. Such an approach might be appropriate for staff employed in roles where communications and access to information are not required, but likely to be unworkable for members of a sales force, for instance. Less severe would be to limit the applications and connectivity allowed on mobile devices from a central position of control. A more holistic approach would be to give staff security training, to ensure devices are used securely; however, this does not preclude malicious use or theft. The team points out that many of the risks associated with personal storage devices are not new. However, the speed of adoption and ubiquity in the workplace of such devices, coupled with increasing sophistication and consumer willingness to adopt advances will continue to pose threats to business security. "Vendors are seeking to develop products that assist organisations to discriminate between legitimate and illegitimate use of devices in compliance with organisational security policies," the team says. However, no complete solution to information leakage is ever likely to be possible. ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The Effect on Music in the Christian Church

    the time; you can please some of the people all of the time; but you cannot please all of the people all of the time." The person who complains, why don't they ever sing our favorite hymns? Really means- Why don't they sing my favorite song more often?

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Precautions like looking out for delayed shipping and making sure prices for products aren't too good to be true are both very simple but significantly important things that can be done. According to PayPal, it is extremely important for vendors to have a Secure Socket Layer (SSL), which encrypts sensitive information and makes it safe.

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    and access to the personal health information", because at the moment, health information is available electronically to many different organizations and individuals. It seems like the use to paperwork to keep all health information is not reliable because in the event of a fire, all information may be loss, however,

  2. Is wi-fi safe? Wi-Fi is widely used in mobile phones, gaming devices, house networks ...

    These problems like hacking of Wi-Fi by terrorist were depicted in the recent bomb blast. We should try and keep our Wi-Fi secure, and do whatever it takes to keep it secure. Due to the lack of security the innocent people get caught.

  1. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    The research done indicates that the major issue regarding the Wi-Fi network is that Wi-Fi networks are not secured and are being misused to send threat emails and gain personal information of the user.

  2. Free essay

    The Evolution of a Theme/Element in Popular Culture. Industries such as the jewellery and ...

    During the 1980s, the government put some regulations on these TV shows that it had to be considered 'educational' (worthy for viewing by children). Toy manufacturers and marketers took the advantage of these new standards, and the first half of the decade saw the introduction of a wave of toy-based cartoons like the 'Transformers' and 'My Little Pony'.

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    The roles of the party were divided between our small parties, and we assign a task to each member, whom would be overall responsible for that set task. The tasks ranged from someone writing the manifesto, finance, advertising, and other menial tasks.

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    This is because without things such as elevators and electricity it would be very inconvenient to make such tall buildings. This aspect fits into topics 5.3: mechanisms and 8.1: energy of the Design Technology syllabus (International Baccalaureate Organization 2007, pp 64-65, 71-72).

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work