Corporation And Security Of Staff Devices

Corporation And Security Of Staff Devices

Table of Contents

TOC o “1-3” h z u Abstract PAGEREF _Toc369161686 h 3Introduction PAGEREF _Toc369161687 h 3The Research Problem PAGEREF _Toc369161688 h 3The aim of the Research PAGEREF _Toc369161689 h 4Research Methodologies PAGEREF _Toc369161690 h 5Ethical issues on the research PAGEREF _Toc369161691 h 7Conclusion PAGEREF _Toc369161692 h 7

AbstractIn the past, people could only use computers owned and managed by a company, and no one would think of lugging in their personal computers (PC) to use within the company. However, today, many things are quite different, where there is an increased number of people using smart phones which has become faster and cheaper. The use of these handheld devices by the staffs within an organization have provided services as well as constant connectivity especially to the mobile workers despite of them presenting new threats to the corporate assets.

The Research ProblemThe staff personal devices are causing ongoing concern for most companies for information security. There are sensitive corporate information which can easily be transported as well as lost; however, the use of Bring Your Own Device (BYOD) movement has led to an increase number of expensive security incidents. The main problem in this case is that, most corporation up to date are still relying on the staff personal devices such as smart phones and personal laptop for business, however these devices fails to have the same security level than those of the company. As a result, the research proposal will discuss on the use of personal devices within the corporate as well as, the security issues associated with the topic. The issue of security level in this case is problematic to the organization because the staffs using these devices have security threats such as loss and theft, malware, spam, phishing and Bluetooth.

The use of staff personal devices is growing dramatically and affecting the corporate of all sizes. The research showed that about 93% of the staffs have mobile devices that connect to the corporate networks and 67% allow personal devices to connect to corporate networks. It is also evident that the staff personal devices are causing challenges especially for the corporate IT. Among the companies which allowed personal devices on their networks reported that the staff uses their own smart phones, tablets and other devices to work with business information, which caused issues. The most common challenge faced by the IT corporate who allowed the staff to use personal devices include, the security issues regarding the corporate information, tracking and controlling access to corporate and private networks, the managing personal devices containing the corporate as well as personal data and applications.

The aim of the ResearchThe research proposal will discuss on the corporation reliance on staff using their personal laptop, smart phones for business purposes; however, the devices seem not to be having the same security level than those of company. The aim of this research paper will contribute to the understanding of various risks issues that are brought upon by using personal devices within an organization.

Significance of the Research

Most staff often feels comfortable using their own devices as opposed to using the corporate machines. In the United States of America, about 46% of the businesses are today allowing their staffs to use personally owned PCs. Indeed many researchers such as the information technology research and advisory company continue reporting that in future employers will require their employees to supply their own devices to be used for business purposes. Today, the significance of using personal computers is mainly focusing on the choice as well as the convenience for the employees and cost savings for the employers. Most corporate rely on the staffs’ personal devices because they cause a significant time shift in the working behavior of the employees. However, some corporate who allows staffs to carry their personal devices such as smart phones in the company have become successful in one way or another. For example, the devices enable the people to conveniently send as well as reply to the emails at any time, and from any location. Personal devices have enabled catching up on emails to be quite easy. It has also suited the staffs given that an outstanding task can now be quickly dealt with while managers on the other hand can obtain prompt responses to their enquiries.

The other benefit of using personal devices such as smart phones in corporate is that, these devices are nearly always at hand as compared to big machines implemented within the organizations. As a consequence, staff members tend to have ready access to the businesses, personal information as well as check on the organizations latest business figures. The ready access to information offers a greater choice in a way the staff members work.

Research MethodologiesIt is evident that mobility can bring both advantages as well as, risks to the corporate. As the staff members bring their personal devices into workplace, most organizations are motivated to encourage the use of these devices for business purposes because they increase the employee productivity within the corporate. Personal devices especially the portable ones can give the employees access to the corporate resources as well as, continuous collaboration with business partners. The other advantage of using these devices is that, the devices reduce the IT costs by allowing the employees to often pay for their own devices, most companies save IT spending on the device purchases and communication services. The research also showed that the use of personal devices for work has become very consistent across all the companies. Little variations were seen in the number of businesses saying they have personal devices on their corporate networks from the smallest business which is about 65 % to the largest 68% as shown below.

Corporation reliance on staff on the use of their personal laptops and smart phones would promote productivity as this allows flexibility in mobility. However, over-reliance on employees’ personal gadgets would compromise the security of data and information of the corporate. Conversely, there are some risks that the corporate may face when they allow the staff devices in the organization. Therefore, these corporate needs to recognize that when the employees connect mobile devices to the organizations systems, the devices must then be treated just like any IT equipment with appropriate security controls. Security issues of these devices should be addressed by the corporate at the outset because the devices used may become a point of security weakness which threatens to disclose business information. Research has also shown that most hackers have discovered that the staff members carrying their personal devices to the corporate may have linked both business and personal data within the system; hence it would be easy for the hackers to get more and more information regarding the corporate. Given that, personal devices platforms have not been natively designed to provide comprehensive security, hackers therefore have a strong incentive of developing new techniques or create the mobile-centric malware for the devices.

Access to Data

The access of data to this research proposal will be gained by using both the primary and secondary sources. The data will also be collected using interviews and questionnaires for the corporate who allow their workers to bring in their personal devices within the organization. The access to these data will not be conditional because many corporate for many years have been faced with the security issues in regards to allowing the staff to bring in their personal devices to the organization.

Ethical issues on the researchConversely, there are many ways in which the staff can abuse their personal devices they use within the corporate. For instance, they may use these devices for other functions other than official such as socializing, blogging and many other activities that eats into staff working hours and unnecessary charges to the organization. These issues can be addressed by pre-programming the devices or network proxy for authentication and access control

ConclusionThe employees who bring their personal computers within the corporate usually know what they want as well as are publicizing their preferences more than ever. The organizations who allows the staff to use their personal devices such as smart phones and iPhones is said to be at an all-time high because these companies tend to give the employees greater say over their used devices. The workers on the other hand are also driving the tablet sales and point to tablets as a preferred method of consuming content.

References

Burke, J. (2006). Neal-Schuman library technology companion: a basic guide for library staff (2nd ed.). New York: Neal-Schuman Publishers.

IFPO, .. (2010). The Professional Protection Officer Practical Security Strategies and Emerging Trends.. London: Elsevier Science & Technology.

Keyes, J. (2004). Securities technology handbook. London: CRC Press.

Loader, D., & Biggs, G. (2002).Managing technology in the operations function. London: Butterworth-Heinemann.

Quigley, M. (2008).Encyclopedia of information ethics and security. New York: Information Science Reference.

Zdziarski, J. A. (2008). IPhone forensics. London: O’Reilly Media, Inc..

Cole, B. C. (2000). The emergence of net-centric computing: network computers, Internet appliances, and connected PCs. Upper Saddle River, N.J.: Prentice Hall PTR.

Mitchell, C. (2004). Security for mobility. London: Institution of Electrical Engineers.

Keyes, J. A. (2010). Securities technology handbook. New York: CRC Press.

Lucas, H. C. (2012). The Challenge of information technology for the securities markets: liquidity, volatility, and global trading. London: Dow Jones-Irwin.

Mahmood, M. A., & Szewczak, E. (2010). Measuring information technology investment payoff contemporary approaches. London: Idea Group Pub..

Reddy, M. T. (2010). Securities operations: a guide to operations and information systems in the securities industry. New York, N.Y.: New York Institute of Finance.

Snoyer, R. S. (2004). Managing microcomputer security. Homewood, Ill.: Business One Irwin.