Mobile Computing Case Study

1301 Words3 Pages

2.3. Main challenges of mobile computing

Challenge 1 - Security and privacy threats of mobile computing

Crossler et al. (2014) claim that the benefits of mobile computing, which relate to improved employee efficiency, productivity and flexibility could be overshadowed by the associated security and privacy risks. First of all, the personal devices of users could carry viruses and malwares endangering the security of the company networks. Second, important corporate data is downloadable on the mobile devices and is therefore sensitive to theft or accidental lost. Finally, a transaction between the user and the network within the company is sensitive to acquiring important or confidential data by cyber pirates and exploit it for wrong purposes. …show more content…

Solutions to the main challenges of mobile computing?

Challenge 1 - Security and privacy threats of mobile computing

One way to deal with the security and privacy challenges of mobile computing is for managers to formulate optimal policies regarding the use of mobile devices within an organi-zation. This method of dealing with security and privacy risks of mobile computing focuses mainly on the internal threats, originating from employees and other internal members of an organization. Harris et al. (2012) propose a model to identify the possible policy that an or-ganization should embrace with respect to mobile computing and the associated privacy and security threats. The model contains two extremes that vary from the “Laissez-Faire” approach to the “Authoritarian” approach, including middle-ground strategies that can assist the company to guide their policies in a certain direction. The former extreme includes the allow-ance of multiple devices and applications connected to the enterprise network, without any form of restrictions. The latter extreme includes a tight and secure control over the amount of applications and devices connected, including restrictions on different levels. Middle-ground strategies differ from setting up a list of allowed devices and application, to actively suggest-ing and pushing employees to use certain technologies in the

More about Mobile Computing Case Study

Open Document