Information Technology in a Global Society - article commentary "What are the security risks of employees using mobile devices in their workspace?"

Authors Avatar

International Baccalaureate

Information Technology in a Global Society

Portfolio -1

What are the security risks of employees using mobile devices in their workspace?

(Business and Employment)

April 2010

Word Count: 994

Article: Inderscience. "A Portable Security Risk."ScienceDaily 31 March 2010. 14 April 2010 <http://www.sciencedaily.com/releases/2010/03/100331081133.htm>.

Table of Contents:

Criteria A

Presentation of the Issue …………………………………………………….. p.3

Criteria B

The IT Background of the Issue………………..………………………………p.4

Criteria C

The impact of the issue ………………………….…………………………..p.6

Criteria D

A solution to the problem arising ……………………………………..………p.7

Works Cited ……………….………………………...…………...……………p. 8

        

News Article:

        A Portable Security Risk …………………..……………………………….…p. 9

        

Criteria A: Presentation of the Issue

Costumers are easily convince in buying new mobile device such as media players, flash drives and smart phones, for work and entertainment, because of their many unique features and many helpful applications. According to a global survey more than two thirds of all cooperation allows employees to bring in personal mobile devices to work, this trend is expected to increase. (, 2010)

The used of these devices may be helpful and keep employees motivated and help them stay connected with business contacts and friends and family in case of emergency. (MobilePhonesAndSafet) Also it’s an easy and quick way to connect to the internet and write emails anywhere and anytime when it’s necessary, so you won’t need to be at the workplace all the time. It’s also useful for transferring data to and from the devices at the workplace.

While the devices may be useful, business owners should be aware that it comes with frightening security risks to both the employees and the business owners. Media players, flash drives and smart phones, such devices now come with USB ports for to transfer data or other documents into or from another device. During this transfer, viruses and malware could also be transferred casing devices to lose important data. This is extremely dangerous if the lost data are important. (Inderscience, 2010)  In 2009 the first iPhone worm was discovered, and it is believe that such malware would only be increase in the up coming years. (Mobile Phones And Safety, -) Mobile devices are a huge target for hackers’ since they are not too difficult to hack, if the hackers gets hold of them for just a few minutes, through Bluetooth, GPS or the internet on that device. (Hacking Alert, 2009) There are not just security risks but also distractions from the devices causing employees to be less productive.

Join now!

Criteria B: The IT Background of the Issue

It is now clear that there is a huge variety choice to choose from when it comes to mobile devices, some common Smartphone brands are, iPhones, BlackBerry and Plam. These devices are almost like minicomputers, some Smartphone are completed with operating system like a real computer, and might include features such as e-book reader, Wi-Fi, and a built-in keyboard or external USB keyboard. (Silicon, 2006) But internet usage seams to be the number one activity on these devices as shown in diagram 1, a survey from June 2009. And ...

This is a preview of the whole essay