Bring your own device can cause problems

Assignment Help Basic Statistics
Reference no: EM131040574

"Bring Your Own Device" Can Cause Problems

Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent arbitrator to both tenants and landlords to resolve any disputes when a tenant moves from a rented property. The company's IT manager, Pete Agathangelou, claims that information security is his highest priority because credibility is critical to his company's success. He began to focus specifi ally on security threats from "bring your own device (BYOD)" in 2012 when he observed basic changes in his office environment. For example, he noticed that at lunchtime younger employees utilized their mobile devices to play games and contact their friends on social networks. He also observed that many senior executives were accessing their e-mail on mobile devices when they were out of the office. Hamilton Fraser had already embraced mobile computing by allowing its employees to have iPhones and iPads. However, employees were using other devices-particularly Android devices-on the company network. Agathangelou concluded that he needed a system to manage all of the mobile devices that the employees were utilizing.

The first step in creating this system was to find a vendor who could manage the issue of employees accessing the corporate network with their own mobile devices. The company ultimately selected MobileIron (www.mobileiron.com), a firm that provides mobile device management and security to large enterprises. MobileIron allowed Hamilton Fraser to identify which mobile devices the company would support. The MobileIron software enabled Hamilton Fraser to keep track of how many employees were accessing the firm's network for business purposes (as opposed to, e.g., playing games or shopping) and whether they were using an approved device. The company's human resources department developed an acceptable use policy, and it began to conduct short training sessions to raise awareness of this policy among employees.

The policy dictates that employees who use mobile devices must download an application to their smartphone or tablet that will enable the IT department to erase any corporate data from the device if it is lost or stolen, or to erase all data from the device if the employee so wishes. Sources: Compiled from J. Gold, "Has BYOD Peaked?" Computerworld, March 21, 2013; J. Scott,

1. What are the advantages of allowing employees to use any mobile device to connect to the corporate network? The dis advantages?

2. Why is it necessary to be able to erase corporate data if a mobile device is lost or stolen?

Reference no: EM131040574

Questions Cloud

Windows network services proposal : Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written format, with at least one diagram, and may include additional diagrams, charts or tables. The assign..
What are the differences between power and leadership : What types of power tactics have you used in your own interactions with bosses, co-workers, or employees? Which do you find most effective? Why?
Growth in telecommuting and other mobile work arrangements : Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the coming years? Will offices as we think of them today exist by 2020? Why or why not?
Reduce the potential for economic damage : Disaster planning can help eliminate and reduce the potential for economic damage, loss of life, and destruction of property during a disaster. This task will focus on the recovery phase of the disaster recovery cycle.
Bring your own device can cause problems : Hamilton Fraser (www.hamiltonfraser.co.uk), located in North London, is an insurance company that specializes in home insurance. The firm is one of Great Britain's major contractors for its deposit protection system, which assigns an independent a..
Identify the specific components of an an institution : Identify the specific components of an an institution. Next use two (2) examples of institutions - such as a financial system, a judical system, or the armed forces - to illustrate what developing countries overall have done to weaken or strength..
Activities of the employee benefit system : Alice has a high regard for privacy and wants the system to have employeesregister and give permission to obtain financial amounts from the dental insurance and retirementcompanies. Draw a use case diagram, context-level data flow diagram represen..
Examine the various tools and techniques for analyzing : Examine the various tools and techniques for analyzing and monitoring the organization's environment. In your response, focus on two of the examples included in the text. First define the tool or technique; then, provide a scenario in which this t..
Organization uses effective communication techniques : Describe both the formal and informal communication methods within the organization. Address whether or not the organization uses effective communication techniques. Evaluate the role culture plays in both the formal and informal methods of communica..

Reviews

Write a Review

Basic Statistics Questions & Answers

  Statistics-probability assignment

MATH1550H: Assignment:  Question:  A word is selected at random from the following poem of Persian poet and mathematician Omar Khayyam (1048-1131), translated by English poet Edward Fitzgerald (1808-1883). Find the expected value of the length of th..

  What is the least number

MATH1550H: Assignment:  Question:     what is the least number of applicants that should be interviewed so as to have at least 50% chance of finding one such secretary?

  Determine the value of k

MATH1550H: Assignment:  Question:     Experience shows that X, the number of customers entering a post office during any period of time t, is a random variable the probability mass function of which is of the form

  What is the probability

MATH1550H: Assignment:Questions: (Genetics) What is the probability that at most two of the offspring are aa?

  Binomial distributions

MATH1550H: Assignment:  Questions:  Let’s assume the department of Mathematics of Trent University has 11 faculty members. For i = 0; 1; 2; 3; find pi, the probability that i of them were born on Canada Day using the binomial distributions.

  Caselet on mcdonald’s vs. burger king - waiting time

Caselet on McDonald’s vs. Burger King - Waiting time

  Generate descriptive statistics

Generate descriptive statistics. Create a stem-and-leaf plot of the data and box plot of the data.

  Sampling variability and standard error

Problems on Sampling Variability and Standard Error and Confidence Intervals

  Estimate the population mean

Estimate the population mean

  Conduct a marketing experiment

Conduct a marketing experiment in which students are to taste one of two different brands of soft drink

  Find out the probability

Find out the probability

  Linear programming models

LINEAR PROGRAMMING MODELS

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd