Mobile security and risks

Research proposal on mobile security and risks affecting the business development

Background and rationale

The main research context is to investigate the security issues and find out exactly the areas of risk of the mobile devices and how we can protect critical information from being compromised. The research focuses on security concerns and the risks associated with the mobile devices affecting the business organisations. The author will also consider the threat of the mobile devices and focuses on benefits and weakness of the mobile devices usage. The topics was chosen as the author is very interested in investigating how these devices are effected and how to provide the necessary counter measures to safe guard the mobile devices from various threats. The majority of the research carried out considering the use of mobile device in everyday business and focusing the role of mobile worker in protecting the devices from risks.

Literature review

Introduction

This section includes a brief overview of mobile device usage and security risks, a review of published literature about the need of mobile security and the necessary counter measures to safe guard from the risks which has an adverse effect on the whole business.

Today's personal digital assistants and smart phones are more powerful when compared with PCs in processing speed and memory capacity as the computers of the late 1990s. The latest smart phones, for example, have a data storage capacity of at least 2 gigabytes, meaning that they can easily store 2,000 e-mails, 3,000 medium-sized documents. These mobile devices improve business productivity and boost the communications in the business saving time and money. With the use of these devices users can make calls, run applications and access needed information and can access the required information, process the data through corporate networks and other internet facilities (shinder, 2008). According to Symantec survey nearly 70 percent of businesses can't go on without access to email from day to day businesses where 72 percent use PDAs or mobile devices. Despite the large number of mobile device users, 40 percent are not having protection against threats without even blocking improper emails, the number of mobile viruses has been doubled for every six months since 2004 (o, 2008).

Why mobile security needed and what are the risks associated with mobile devices

According to IDC reports by the year 2009 out of total country's workforce more than 70% of mobile workers in United States use mobile devices and 81% of the executives around the world are connected through mobile devices (Inc, 2009). Mobile devices are becoming increasingly popular as they are powered and supported by various operating systems such as Windows Mobile, Symbian, Apple and BlackBerry. These microcomputers support various business applications such as enterprise resource planning and customer relationship management, these applications can easily installed by device owners itself. When compared to the past these devices perform multipurpose tasks and they are the important business tool and channel for the corporate data which can connect to high speed networks (Weinschenk, 2006).

Mobile workers use mobile devices to share confidential information by various means by sending or receiving email, chat and browse web pages, store data, and use personnel information management functions such as meeting agendas and contact information. With additional features such as voice recorders they can take notes or dictate notes to their business partners. When they are on the train, airport checking flight schedules many of the mobile applications are easy to use and keep the track of their current projects such as workflow approval applications such as Microsoft SharePoint. There are more concerns about the corporate data and security of these devices as they are used to store personnel and professional information much more attention is needed to protect them from risk (traylor, 2009). There are number of questions arise as how to access information and connect to corporate network and what will happen if these devices are stolen, for example iPhone left on office desk can be stolen and the data in it is copied in couple of minutes which is less time than it takes to have our breakfast trend 2009 There will be a huge loss when one these devices is lost or stolen and can have an adverse effect on the whole organization as sensitive and confidential information would no longer be controlled by the organization (Weinschenk, 2006).

About 73 % mobile workers say that they are not aware of security threats and risk associated with the mobile devices when they are on the go. 28 % said they never consider security risks. Some of the mobile workers say that they never consider best practices of security risks and when they were asked about their role the only reason they say is I'm quite busy or thats not my job and its the job of IT people (Inc, 2009).

Conclusion

Mobile workers are provided with these mobile devices so as to increase their organisation productivity, they should keep in mind that there are two faces for the mobile devices one side boosts up the revenue the other side may effect the whole business turnover if they are consider as simple devices. All the organisations should consider the need for mobile security and should take the necessary precautions to mitigate the risks associated with these devices. Many of the common issues related to laptops and PCs security are applicable to the mobile devices. Awareness about the mobile security can be achieved through training, developing security policies, and selecting the right security technologies like authentication, encryption, antivirus, and firewall protection systems.

Aims and objectives

This research project aims to investigate the security, risks of mobile device usage in business world and provide the necessary counter measure to minimise the effects due to mobile devices in business sector.

The main objectives are

To investigate the following

  • Why we need mobile security
  • What are the effects to business world
  • What are most possible spreading ways
  • How to protect from these risks and security threats
  • To make recommendations on use of the mobile devices for business

Research methodology:

Research philosophy

There are two types of research philosophy

  • Positivism:
  • Interpretivism

Research approach

Inductive

Deductive

Research strategy

For the purpose of the research the author adopted mixed method approach. This was used because ......, the author must investigate both qualitative and quantataive data.

Case study

A case study approach was used to gather qualitative data via

  • The methodology
  • Ethical consideration
  • Resources/constraints

The time frame which was given to complete the project

The scope of research considers how mobile devices risks, security cause business world and how they can be protected from various infectious roots.

The location of survey is subjected to one location

The organisational survey is limited to one organisation

Most of the information is gathered from the various resources so availability of the resources is to be considered Schedule of activities/ project plan

References

http://whitepapers.theregister.co.uk/paper/view/227/mobile-device-management-and-security.pdf

http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/could-your-mobile-device-land-your-ceo-in-court/?cs=36105

Please be aware that the free essay that you were just reading was not written by us. This essay, and all of the others available to view on the website, were provided to us by students in exchange for services that we offer. This relationship helps our students to get an even better deal while also contributing to the biggest free essay resource in the UK!