Bring your own device can cause problems

Assignment Help Basic Statistics
Reference no: EM131040574

"Bring Your Own Device" Can Cause Problems

Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent arbitrator to both tenants and landlords to resolve any disputes when a tenant moves from a rented property. The company's IT manager, Pete Agathangelou, claims that information security is his highest priority because credibility is critical to his company's success. He began to focus specifi ally on security threats from "bring your own device (BYOD)" in 2012 when he observed basic changes in his office environment. For example, he noticed that at lunchtime younger employees utilized their mobile devices to play games and contact their friends on social networks. He also observed that many senior executives were accessing their e-mail on mobile devices when they were out of the office. Hamilton Fraser had already embraced mobile computing by allowing its employees to have iPhones and iPads. However, employees were using other devices-particularly Android devices-on the company network. Agathangelou concluded that he needed a system to manage all of the mobile devices that the employees were utilizing.

The first step in creating this system was to find a vendor who could manage the issue of employees accessing the corporate network with their own mobile devices. The company ultimately selected MobileIron (www.mobileiron.com), a firm that provides mobile device management and security to large enterprises. MobileIron allowed Hamilton Fraser to identify which mobile devices the company would support. The MobileIron software enabled Hamilton Fraser to keep track of how many employees were accessing the firm's network for business purposes (as opposed to, e.g., playing games or shopping) and whether they were using an approved device. The company's human resources department developed an acceptable use policy, and it began to conduct short training sessions to raise awareness of this policy among employees.

The policy dictates that employees who use mobile devices must download an application to their smartphone or tablet that will enable the IT department to erase any corporate data from the device if it is lost or stolen, or to erase all data from the device if the employee so wishes. Sources: Compiled from J. Gold, "Has BYOD Peaked?" Computerworld, March 21, 2013; J. Scott,

1. What are the advantages of allowing employees to use any mobile device to connect to the corporate network? The dis advantages?

2. Why is it necessary to be able to erase corporate data if a mobile device is lost or stolen?

Reference no: EM131040574

Questions Cloud

Windows network services proposal : Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assign..
What are the differences between power and leadership : What types of power tactics have you used in your own interactions with bosses, co-workers, or employees? Which do you find most effective? Why?
Growth in telecommuting and other mobile work arrangements : Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist by 2020? Why or why not?
Reduce the potential for economic damage : Disaster planning can help eliminate and reduce the potential for economic damage, loss of life, and destruction of property during a disaster. This task will focus on the recovery phase of the disaster recovery cycle.
Bring your own device can cause problems : Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent a..
Identify the specific components of an an institution : Identify the specific components of an an institution. Next use two (2) examples of institutions - such as a financial system, a judical system, or the armed forces - to illustrate what developing countries overall have done to weaken or strength..
Activities of the employee benefit system : Alice has a high regard for privacy and wants the system to have employeesregister and give permission to obtain financial amounts from the dental insurance and retirementcompanies. Draw a use case diagram, context-level data flow diagram represen..
Examine the various tools and techniques for analyzing : Examine the various tools and techniques for analyzing and monitoring the organization's environment. In your response, focus on two of the examples included in the text. First define the tool or technique; then, provide a scenario in which this t..
Organization uses effective communication techniques : Describe both the formal and informal communication methods within the organization. Address whether or not the organization uses effective communication techniques. Evaluate the role culture plays in both the formal and informal methods of communica..

Reviews

Write a Review

Basic Statistics Questions & Answers

  Proportion of items with a desired attribute

1. Given a population where the proportion of items with a desired attribute is p = 0.25, if a sample of 400 is taken,

  Determining assignment of probabilities to six faces of die

If die is loaded so that 6 comes up with probability 0.2 and probabilities of 2,3,4, and 5 faces are not affected, determine the assignment of probabilities to the six faces?

  Test scores for a calculus class had a mean of 69 with a

test scores for a statistics class had a mean of 79 with a standard deviation of 4.5. test scores for a calculus class

  Decisions in taking machines among two

What is the correct answer to Suppose you were trying to decide which of two machines to purchase. Furthermore, suppose the length to which the machines cut a particular product part was important.

  A toaster manufacturer receives large shipments of thermal

a toaster manufacturer receives large shipments of thermal switches from a supplier. a sample from each shipment is

  Write the least squares prediction equation for the model

Calculate and give an interpretation of the coefficients based on a one-unit change in each xi.

  Find the critical f value for a sample of four observations

What is the critical F value for a sample of four observations in the numerator and seven in the denominator? Use a one-tailed test and the .01 significance level.

  Show a monopolist will never produce on inelastic portion

Show that a monopolist will never produce on the inelastic portion of the demand curve and provide an explanation.

  Hypothesis test to validate the claim

Set up a hypothesis test to validate this claim.  Using a significance level of .01 to test this hypothesis, what is your decision rule

  What would be a reasonable density function for l

What is the average distance that the worker needs to walk to the retrieval location (including units)?

  In a standard clover-leaf interchange there are four ramps

in a standard clover-leaf interchange there are four ramps for making right-hand turns and inside these four ramps

  Confidence interval for the proportion of adults

Compute the 95% confidence interval for the proportion of adults who are planning to buy a new car in the next 6 months.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd