2.3. Main challenges of mobile computing
Challenge 1 - Security and privacy threats of mobile computing
Crossler et al. (2014) claim that the benefits of mobile computing, which relate to improved employee efficiency, productivity and flexibility could be overshadowed by the associated security and privacy risks. First of all, the personal devices of users could carry viruses and malwares endangering the security of the company networks. Second, important corporate data is downloadable on the mobile devices and is therefore sensitive to theft or accidental lost. Finally, a transaction between the user and the network within the company is sensitive to acquiring important or confidential data by cyber pirates and exploit it for wrong purposes.
…show more content…
Solutions to the main challenges of mobile computing?
Challenge 1 - Security and privacy threats of mobile computing
One way to deal with the security and privacy challenges of mobile computing is for managers to formulate optimal policies regarding the use of mobile devices within an organi-zation. This method of dealing with security and privacy risks of mobile computing focuses mainly on the internal threats, originating from employees and other internal members of an organization. Harris et al. (2012) propose a model to identify the possible policy that an or-ganization should embrace with respect to mobile computing and the associated privacy and security threats. The model contains two extremes that vary from the “Laissez-Faire” approach to the “Authoritarian” approach, including middle-ground strategies that can assist the company to guide their policies in a certain direction. The former extreme includes the allow-ance of multiple devices and applications connected to the enterprise network, without any form of restrictions. The latter extreme includes a tight and secure control over the amount of applications and devices connected, including restrictions on different levels. Middle-ground strategies differ from setting up a list of allowed devices and application, to actively suggest-ing and pushing employees to use certain technologies in the
Should Apple be forced to unlock an iPhone or not? It becomes a controversial topic during these years. Most people are concerned with their privacy and security. Darrell Issa is a congressman and has served the government since 2001. Recently, he published “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent” in Wired Magazine, to persuade those governors worked in the Congress. It is easier to catch administrators’ attention because some of them want to force Apple to unlock the iPhone. Darrel Issa focuses on governors because he thinks they can support the law to make sure that everyone has privacy. He addresses the truth that even some of the governors force Apple to hack iPhones when they need people’s information. He considers maintaining people’s privacy as the primary purpose. He also insists that Apple should not be forced to use their information which could lead people’s safety. In “Forcing Apple to Hack That iPhone Sets a Dangerous Precedent,” Darrell Issa uses statistics and historical evidence to effectively persuade his audience of governors that they need to consider whether or not Apple should be forced to hack or not because it could bring people to a dangerous situation and forget the purpose of keeping people’s privacy.
[38] Mark Bowker. The Enterprise Strategy Group. The VMware Mobile Secure Workplace 2013 [Online] Available from: [Accessed 07 Dec 2013]
The evolution of cyber threats has reached a critical point where hackers withhold important information in exchange for payment. In the last three decades, the Internet has fundamentally changed the way people, governments, and private organizations store, use, and manage information. The age of the Internet of Things has left everyone at the risk of a ransomware attack (Richardson and North 13). The ubiquitous connection to the Internet through mobile devices such as tablets, smartphones, and laptops has made the Internet the obvious and convenient place to store personal data including photos, research information, and business records. The challenge is that cybercriminals have developed a new way of getting illegitimate
Townsend, A. M. & Bennett, J. T. (2003). Privacy, technology, and conflict: emerging issues and action in workplace privacy. Journal of Labor Research, 24(2), p. 195. Retrieved October 19, 2004, from EBSCOhost Database.
In this case study, I aim to present the recent issue about Cyber security, protecting client’s private data and information through the controversial Apple and
Print Lazar, Wendi S. “Limitations to Workplace Privacy: Electronic Investigations and Monitoring” Computer and Internet Lawyer (2012): SIRS. Web. The Web. The Web.
Technology has developed in leaps and bounds over the past few decades. The case is that the law always has difficulty keeping pace with new issues and technology and the few laws that are enacted are usually very general and obsucre. The main topic of this paper is to address the effect of technology on privacy in the workplace. We have to have an understanding of privacy before trying to protect it. Based on the Gift of Fire, privacy has three pieces: freedom from intrusion, control of information about one's self, and freedom from surveillance.1 People's rights has always been protected by the constitution such as the Fourth Amendment, which protects people from "unreasonable searches and seizures". As said by Eric Hughes, "Privacy is the power to selectively reveal oneself to the world."2 As written by Supreme Court Justice Louis Brandeis in 1928 is the right most valued by the American people was "the right to be left alone."3
Many people in today’s society rely on technology to help us with our daily lives and help us stay connected to family, friends, and other people. The advancements in today’s cell phone technology is very complex and made to be efficient for their owners, allowing them to surf the net and IM message people instantly. Cellphones in particular have developed very fast in the past 15 years. From my childhood, cell phones have evolved from the old school Nokia bricks that allowed texts, calls, and simple graphic games, to todays I-Phones that have higher computable capabilities than some computers. In the United States alone, there is an estimated population of around 297 million people, and 197 million people are subscribed to cell phone companies (Starr). With so many people in today’s society with so much power and opportunity in the palm of their hands, we shouldn’t forget that “With great power comes great responsibility” –Voltaire.
The computer is considered one of the most important technological advances of the twentieth century. Security and privacy issues have been in existence long before the computer became a vital component of organizations' operations. Nevertheless, the operating features of a computer make it a double-edged sword. Computer technologies with reliable error detection and recording capabilities, permit the invasion of a supposedly secure environment to occur on a grand scale and go undetected. Furthermore, computer and communications technology permit the invasion of a persons' privacy and likewise go undetected. Two forces threaten privacy: one, the growth of information technology with its enhanced capacity for surveillance, communication, computation, storage and retrieval and two, the more insidious threat, the increased value of information in decision making. Information has become more vital in the competitive environment, thus, decision makers covet it even if it viol!
With the increasingly ubiquitous nature of mobile devices and online availability, including smartphones and tablets, there is also an understandable concern about the level of security that is afforded to such devices. This can be considered as increasingly important given the proliferation of policies such as BYOD (Bring Your Own Device) which are being used by diverse organizations as a way of lowering the cost of ownership for such devices while also leveraging the flexibility advantages that their utilization can bring. It is therefore an area of immense interest due to the changing and emerging nature of both the technology itself as well as the security concerns. Due to the sensitive and confidential information that would exist on such devices, it is imperative that security solutions and processes are implemented in order to protect and secure such content from the proliferation of threats and vulnerabilities which can affect mobile devices (Juniper Networks, n.d.). Mobile devices are being exposed to a record number of security threats, with potentially alarming statistics indicating a 400 percent increase in Android malware, for example, while Wi-Fi connections are also being increasingly targeted.
"While practically everybody today is a potential mobile phone customer, everybody is simultaneously different in terms of usage, needs, lifestyles, and individual preferences," explains Nokia's Media Relations Manager, Keith Nowak. Understanding those differences requires that Nokia conduct ongoing research among different consumer groups throughout the world. The approach is reflected in the company's business strategy:
Have you ever asked yourself, what the world would be like if there weren’t any mobile applications. Society is impacted by the new development in technology daily. Someone is always claiming that their inventions will revolutionize the world, but no invention has had more success over the years, in the cellular world than mobile applications. People all around the world use millions to billions of applications daily for personal and business uses. For example, social networking which is use by all generations of people. It has an influence the way we purchase cell phones, in order to have the capability. With the creation of different smartphones and tablets, comes the demand for more mobile applications. This causes competition among application builders. Mobile applications are designed to its user making their experience less complicated. Mobile applications have their advantages and disadvantages, depending on its design and designer. They can be created to be very simple or complex, depending on its intended function. Has society benefited from the usages of mobile applications or is it just a distraction. What impact do mobile applications have on society.
The world today is a result of centuries of evolution; one of the major adaptations is technology, specifically the invention of the smartphone. The smartphone is a cellular phone that has the capabilities of performing similar functions to that of a computer (Oxford Dictionaries’ online dictionary, n.d.). The smartphone is owned by youth for the most part; however, adults and seniors are also turning toward using this device. This in turn demonstrates the popularity of this marvelous device, and is the reason why it is constantly monitored by its users. The continuous evolving of the populations' wants and needs such as communication, searching of information, entertainment and recording, makes owning a smartphone essential, and beneficial as it is portable, reliable and efficient.
Devices such as smartphones have become essential - over 1 billion smart phones were sold worldwide last year (Zeman, 2014). However, our reliance on technology has its pitfalls, and we are also more vulnerable, often in ways we do not know or understand. If we are to maintain our security we need to find ways to do this that fit in with our lifestyles. We can change behaviours, by education and training, but ideally we should design in security from the ground up, rather than adding it on, or trying to force actions that people simply won’t follow because they find them irritating or think they’re simply not important. Security should be something that just happens.
...h the threat of “Mobile Malware” looming in the air, the desire to give the general public fair warning has never been greater. This paper was intended to provided that knowledge the general public needs and will reinforce the topic to those who were already aware. The history of malware gave you a look into the not so distant past. The discussion of technical examples of malware was intended to show you how rapidly the threat is developing along with the statistics of malware’s current expansion, and the future examples of malware and research showed you concepts that were unimaginable to the common electronic consumer. The majority of malware was originally designed to be a practical joke, but as we can see from the ever growing desire for malicious intent, the evolution of malware has followed suite. We can only hope that the growing need for security can be met.