Home » Downloads » Mobility – Costs and Benefits

Mobility – Costs and Benefits

Mobility – Costs and Benefits

Mobility – Costs and Benefits
Begin by providing a brief critical analysis of this week’s reading, “Mobile Devices Security Management.” Share insights you gained and additional questions that were raised. Discuss areas where you agree and disagree with the conclusions presented.
Based on the Halpert article and your additional research on this topic, discuss the issues related to mobile devices both at home and at work. Define the risks, and discuss how security governance and program management tactics are addressing these issues.

Literature Comparison
As you work on your annotated bibliography, share the insights you have gained by comparing scholarly literature and resources with respect to your project topic.
Discuss what you have encountered in terms of key strengths and weaknesses in terms of both security governance and program management literature. How has this information helped you critically evaluate the topic and locate scholarly evidence to support your position?
Use your text to complete the following:
• Read Reading 1, Halpert’s “Mobile Devices Security Management,” pages 2–6. While business management looks at advances in mobile technology and sees increased flexibility for employees, customers, and clients, the security management professional sees new opportunities for information leaks. As you read this article, consider how security policies are being tested and modified to support mobile access needs and desires.
Research
In preparation for this unit’s discussions and to further explore the topic areas, complete research of scholarly and relevant practitioner literature or case studies in the following area. Read the discussion topic instructions for further details.
• Security policies for mobile devices.

Reference:
Whitman, M. E., & Mattord, H. J. (2009). Readings and Cases in the Management of Information Security. Boston, Massachusetts:

 

 

…………………………Answer preview………………………..

Mobile device security management is one of the main factors seriously considered by IT based organizations. Mobile device security management ensures that sensitive corporate and employee data remain safe and secure. Most enterprises such as Amazon have numerous mobile initiatives spread across the organization. The use of mobile in organizations has influenced controversial issues such as insecurity……………………….

APA
750 words