Criteria B: The IT Background of the Issue
It is now clear that there is a huge variety choice to choose from when it comes to mobile devices, some common Smartphone brands are, iPhones, BlackBerry and Plam. These devices are almost like minicomputers, some Smartphone are completed with operating system like a real computer, and might include features such as e-book reader, Wi-Fi, and a built-in keyboard or external USB keyboard. (Silicon, 2006) But internet usage seams to be the number one activity on these devices as shown in diagram 1, a survey from June 2009. And the top two activities of the top four activity happens to be camera and mp3, which are not activities which should be used in workplaces.
Diagram 1 (Survey3, 2009) : Most Common Mobile Contact activities of Smartphone Owners Worldwide.
One of the most commonly used Smartphone would be an iPhone [Diagram 2]. In an iPhone you are able to email or used internet to connect with friends, family and business contacts [Diagram 2 iii) & iv)]. Notes option is useful when note taking is needed in emergency situation, and is able to be stored digitally [Diagram 2 v)]. An iPhone has got a touch screen, if you are to search for contacts, and is currently at the ‘home’ page you are to used you finger to move it to the right, a search will pop up search for the contact you want. iPhone contact has got the option of putting a picture, emails and website in, this is useful for business contact when wanting to email or visit their website instead of giving them a call. A USB port is available on the iPhone like most smartphone to be able to connect to other mobile devices [Diagram 2 i)]. A calculator option is also present for quick calculation when needed [Diagram 2 ii)].
Diagram 2 (Apple, 2010) An iPhone
Criteria C: The Impact of the Issue
Mobile devices offer employees a way to work when not in the workplace itself, and most employees would have a Smartphone. But there are many seriously issues that comes with it. When hackers hacked into the phone, using Bluetooth, GPS or the internet on that device to obtain the phone number if the device is a cell phone allows them to make calls and have it charged to your account, and also steal information in the device, like taking the contacts information on the phone. (Hacking Alert, 2009) Many important contacts and other data may be present in that device, if there are business contacts, that business could lose valuable information about their client.
Flash drives or other USB devices that could be connected to other device such as computers in a workplace, when the USB is connected, if that USB device contains virus or malware it could now travel into that computer. If it is indeed a computer at workplace confidential information may be lost. This could mean the possible lost of millions of dollars for that business. (, 2010)
Smartphone and MP3 can be a great distraction to the employees. While using Smartphone employees could easily get side tracked and would lose all focus on their work for hours. Even though MP3 and most Smartphone could provide music for the user to help keep the ‘calm’ it could sometimes be distracted for them, and they would become less productive. (, 2010)
Criteria D: Solutions to Problems Arising from the Issue
There are many different way that an organisation could do to help reduce the risk. An option would be to ban personal storage devices from the workplace or have a limit for applications and connectivity allowed on the mobile devices. This option would be appropriate for employees that would not need to communicate with other clients.
This solution will allow the company assurance that their information will be kept safely since such devices are band from the workplace. But this might cause a lot of problems for the employees, since they are not allow to have mobile devices it would be very difficult for them to communicate with their family or friends when ever and where ever they want. This will cause a lot of pressure on to the employees, because they would feel like they are trap and when they are stress they don’t have an outlet.
Work Cited:
Securing Personal-liable Mobile Devices on the Corporate Network (2010).Http://inform.com/. SC Magazine, 10 Apr. 2010. Web. 16 Apr. 2010. <http://inform.com/science-and-technology/securing-personalliable-mobile-devices-corporate-network-899253a>.
Inderscience. "A Portable Security Risk."ScienceDaily 31 March 2010. 20 April 2010 <http://www.sciencedaily.com/releases/2010/03/100331081133.htm>.
Mobile Phone Regulations in the Workplace. Http://www.mobilephonesandsafety.co.uk. Web. 16 Apr. 2010. <http://www.mobilephonesandsafety.co.uk/mobile-phone-regulations-workplace.html>.
Cell Phones - Hackers Next Target! (2009). Hacking Alert. 2009. Web. 16 Apr. 2010. <http://www.hackingalert.com/hacking-articles/cellphone-hacking.php>.
Analysis: What Is a Smart Phone? (2006). Silicon. 13 Feb. 2006. Web. 18 Apr. 2010. <http://www.silicon.com/technology/mobile/2006/02/13/analysis-what-is-a-smart-phone-39156391/>.
IPhone. Digital image. Apple. 2010. Web. 18 Apr. 2010. <http://www.apple.com/iphone/gallery/>
Survey3. Digital image. Impactlab. June 2009. Web. 18 Apr. 2010. <http://www.impactlab.com/2009/07/15/iphone-dominates-cell-phone-satisfaction-survey/>
News Article:
A Portable Security Risk
ScienceDaily (Mar. 31, 2010) — More and more employees are bringing personal mobile devices, such as media players, flash drives and smart phones, to work for entertainment, communications and other purposes. Equally, many employers issue their staff with such devices to allow them to be more mobile and to run business applications as part of their job.
This explosion of personal devices with built in web connectivity, office applications and email can improve working practices but also comes with risks not limited to time wasting. The portability, connectivity, and storage capacity of mobile devices means they bring with them the threat of data leakage, data theft, and the introduction of viruses or other malware into workplace computing systems.
Computer scientists Sean Garrity and George Weir of the University of Strathclyde, in Glasgow, writing in the International Journal of Electronic Security and Digital Forensics, outline some of the problems associated with the enormous growth in mobile technology and explain how those concerns might be addressed. Portable storage devices of every ilk whether mp3 player or mobile phone now have several ways of connecting to other devices and networks including wi-fi, Bluetooth, and USB. Many of these devices also now have several gigabytes of storage capacity and are often expandable and so have the ability to capture vast quantities of data, whether for legitimate work purposes or for illicit use.
Many businesses and organisations are rightly concerned about the loss or disclosure of intellectual property or sensitive information about customers and employees, explain Garrity and Weir. "Mission critical data must be protected in order to maintain business operations," they explain. "The public scrutiny, embarrassment, financial and judicial penalties resulting from data leaks are a major concern, and access control are among the most critical issues, they add. However, the widespread use of personal data storage devices is an ever-present risk for management to lose control over the flow of business and non-business information into and out of the enterprise.
The researchers suggest that there are several measures that an organisation might take to remove undue risk. First, and perhaps most draconian is simply to ban personal storage devices from the workplace. Such an approach might be appropriate for staff employed in roles where communications and access to information are not required, but likely to be unworkable for members of a sales force, for instance. Less severe would be to limit the applications and connectivity allowed on mobile devices from a central position of control.
A more holistic approach would be to give staff security training, to ensure devices are used securely; however, this does not preclude malicious use or theft. The team points out that many of the risks associated with personal storage devices are not new. However, the speed of adoption and ubiquity in the workplace of such devices, coupled with increasing sophistication and consumer willingness to adopt advances will continue to pose threats to business security. "Vendors are seeking to develop products that assist organisations to discriminate between legitimate and illegitimate use of devices in compliance with organisational security policies," the team says. However, no complete solution to information leakage is ever likely to be possible.