Discuss About The Ethical Tone Consistency Policy Compliance?
According to a survey on mobile device utilization, the quantity of the exploitation of the mobile devices will be increased approximately 10 billion to 1.5 for every people on the globe (Ripley, 2013). Since the mobile devices are incorporated into everyone’s life, most of the employees prefer to work in their own devices. The organizations made a conclusion that the employees should be aware of the safety mechanisms in order to control their device.
Currently, the workers are insisted by the companies to be more productive in their work. For this purpose, a legible application is required to let the employee devices to be operated in a secured environment in order to attain higher economics advantage and productivity. So, BYOD seems to be an appealing choice to more enterprises.
By means of asset possession and physical locality, the conventional security prototype for security the IT firm’s outer limits is influenced. The company mails, office applications, reminders, etc. can be accessed anywhere by using the personal gadgets (Brad, Trinkle, Crossler & Warkentin, 2014).
In order to properly define the safety standards and procedures in such a way to keep upright the staff requirements and security issues, the firms are in exertion.
So, this report illustrates the major BYOD risks and the essential steps required to confront the security issues depending upon the firm’s imperative and prevailing challenges.
The safety risks of employing BYOD in organization are based on the following key aspects:
The selection of security management mode employed in the organization largely depends on the risk definition and treatment provided by the organization for various security risks.
The organizations should be aware of the sorts of operations and data, which are exploited during BYOD implementation. For an example, the online payment processing performed using mobile devices need PCI-DSS acquiescence in the corresponding gadgets. Hence, a single use case does not comply with all the mobile devices (AirWatch, 2012).
The risks are accelerated not only by the geographic disbursement of the mobile devices, but also due to the inappropriate lawful regulations in the corresponding areas.
In order to achieve a safe and profitable level in the organization, the aforementioned steps need to be followed by the firms during the initiation period of BYOD implementation.
The BYOD environment imposes several threats to an enterprise. An organized approach ought to customize the confronted risks and facilitate to confirm that the manipulation presents to keep up the safety and compatibility of the mobile devices inside the organization (Cisco, 2012).
The organization tends to describe the effects of the BYOD risks since more issues related to risk contour, characteristics, and utilization have been considered. The BYOD risk that are similar to the impacts caused by other types of hazards, have certain prospective to accelerate the risk factors.
The risk environment can be distinguished based on the specific factors as depicted below:
3.1. Security of Mobile Devices
The conventional mobile devices tend to be uncomplicated in the aspects of security and management, since they are manufactured by a single company, which impose more restrictions for accessing the organizational data (Cook, 2013). Hence, the organizations had no limitations in applying the unified security procedures for all the devices distributed by the same fabricator. But the BYOD platform completely changed this secured environment by permitting all the employees to bring their own devices of distinct configuration and models.
The risks are expanded because of the assorted gadgets environment and due to the extreme number of mobile devices. The same security procedures applied for the constant administration interface need to be modified due to the implementation of BYOD of various device range and operating systems. Moreover, the users having more devices prefer to connect them with the organizational framework that intensifies the security risks. So, all those devices should be protected and self-assured.
Conveying great business value to the customers is the prime objective of the technological devices. But the productivity can be decreased if the personal mobile devices are not allowed due the mitigation of stringent security policies. This risk-aversion process makes the employees to perform an illegitimate and unsafe access to the confidential information. So, the security programs should be well drafted in such a way that it comply with various kinds of users and user divisions. The local device accessibility, mobile network contributor, and utilization conventions should be adopted by the international enterprises. The customer experience can be enhanced by employing the eloquent use cases since the inefficient use cases results in catastrophe (Drew, 2012). By acquiring the user’s product and the technology, the customer satisfaction can be obtained.
The expertise on these risks can help the enterprises to procure the vital portions so that the users can protect their gadgets and the improved information safety can be endorsed. Based on the concerns mentioned below, the security risks can be categorized.
Large number of mobile phones and smart phones are missing every year. About 22 percentage of the mobile devices are lost and about 50% of these stolen devices are not recuperated (Robert, Crossler, Long, Tina, Loraas & Trinkle, 2017). Many devices are stolen for the intention of selling their hardware for second-hand. And so, the information stored in the devices is accessed by somebody without the knowledge of the device owners. In order to wipe the information stored in the device, certain security mechanisms like password fortification, robust safety policies, and encryption must be incorporated within the device.
3.1.2. Corporeal Approach
The hackers can corporeally make access to the user’s sensitive information stored in the device. But the corporeal access is not possible in inert hardware like terminals and servers. If a hacker obtained corporeal access, the device cannot be secured properly (Forrester, 2012).
If the employees fetch older and insecure mobile devices to the organization, the device’s entire security state will be affected, thereby increasing the risks to device operating system, applications, and hardware components. The iPhones manufactured before the introduction of 3G technology lack in some security features (Edwards, 2013). And the risk is increased if this scenario is followed in the BYOD environment. Hence the organizations should set the security standards to match with all the employee’s personal device requirements.
3.1.3. Operational functionality of user device
The ownership of the devices used by the employees at work dominates the management of the devices. This results in jail breaking of the operating systems and lets the organizational data to be vulnerable to much type of threats. By this way, the security aspects of many operating systems will be vanished. Hence, the loss of the device will not be notified to the organization due to the sense of ownership possessed by the employees.
3.1.4. Insufficient knowledge on risks
The acknowledgement of the aforementioned hazards in the organization is needed in case of the absence of client security. Being aware of the security techniques for safeguarding the devices is an essential element against the different type of risks. The danger derived from the gadget itself ought to be surveyed as a constituent of the organization’s hazard appraisal system. In order to manage the fluctuating degrees of danger related to work capabilities, single layered gadget design is feasible. For an example, a custom application incorporated in the mobile devices for presenting the sensitive financial data to the board will invariable more exposed to accidental theft when compared to a mobile device having access to applications like email and calendar.
3.1.5. Available on through augmented data contact
The associated worker’s capacity which is one of the best favorable circumstances of a portable empowered workforce sadly increases the quantity of the occurrence of the hazards. The representatives are currently venturing to the planet far corners having access to corporate information anyplace and anywhere when they leave their information at work. Both the business information situated on the telephone and corporate information will be trade off by the lost or stolen cell phone. In addition to that, the security bugs presented in the individual applications such as online networking, websites, etc. can be conceivably connected through this new availability (Gessner, Girao, Karame & Li, 2013).
3.2. Dealing the risk of mobile application
In everyday life, applications embedded inside the mobile device plays a major role. The apps ranging from map, games, office productivity, to social networking improved the significance of the smart phones. The risk of BYOD devices can be increased by the apps crafted by the innovation of the app developers in an enterprise (Gajar, Ghosh & Rai, 2013).
Since the organizations allows the employees to bring their devices to procure the data associated with their work, can enviably leads to security breaches enlisted below.
The application created by the enterprise for accessing the job related information can open doors to more type of risks.
The application containing malicious security holes will tend to infect the whole device and other devices in the organization.
3.2.1. Malware Apps
The apps containing malicious code embedded within it affect the security of the enterprise data. These types of apps copy the format of the legitimate apps and modify the code by inserting the malevolent data within it (Johnson, 2012). This code arrives either from an external interface like NFC, File sharing server, or from a malicious website.
Nowadays, the malwares are generally available as a free to use app in illicit play stores. These malicious apps run on the user’s mobile device and hacks the sensitive information of the user.. Mobile malware mostly exists on the Android devices while writing. According to Kaspersky, 98% of the malwares are detected on the Android platforms (Leavitt, 2013). And when the employee devices contain malware apps within it, there is a chance of exploiting the confidential information in the organization to third party persons. So the personal devices containing the Android operating system should be protected against the malware attacks.
3.2.2. App Susceptibility
The app susceptibility comprises security concerns within the customized software and the susceptible app supports the hackers to steal the confidential information from the organization (Singh, 2012).
The conventional web app and personal computer app susceptibility is similar to the mobile App susceptibility which impacts on the local data stored on the mobile device (Krahel, Miklos & Vasarhelyi, 2014). The organization data, employee data, and even the entire organization will be affected by this vulnerability. If the mobile devices are not administered by the IT department of an organization, the risk caused by app susceptibility will be increased further. In order to defeat this risk, administration of all the apps and partition of the confidential data and task are suggested. By acquiring less maintenance over the employee devices and due to the ownership nature of the employees, the organizations have to deal with more number of apps installed on the employee devices. There is a chance of installing the unauthorized apps for utilization like to edit, hold, and transfer the enterprise data by the employees.
Thus in order to deal with the security breaches and holes, proper monitoring and software updates are required to be performed by the IT department of an organization.
3.2.3. Method for contradicting app risks
3.3. Administration of Mobile Environment
For administering the precise catalog of the mobile devices and to update the operating system, the enterprise effort is increased in BYOD platform. The conventional personal computer catalog cycle is around 6 years whereas for the mobile space, the device yield is about 2 to 3 years (Li, Peng, Huang, & Zou, 2013). The enterprises are struggling a lot to maintain the precise inventory of the mobile devices and software applications. Multiple up gradation of the operating system is required for the hardware that can be started by the users. The indirect security risk will be encountered by the unidentified devices without enterprise security procedures and scrap administration.
3.3.1. BYOD registration and policy management risks
In the BYOD environments, the hardware and software components of the mobile devices containing the organizational data vary based on the provision of employee access. It creates further overhead for applying the security procedures to the terminals and servers. The proposal variation also makes the wiping process very difficult when the mobile devices are resold, exchanged, or when the mobile carriers are modified (Polla, Martinelli & Sgandurra, 2013).
The system updates required for mobile operating system need higher level of authentication and approval process when compared to the personal computer operating system. Before installing the OS in Android devices, they are appraised at three distinctive intensities. The device manufactures should make ensure that the hardware does not impact with the software update functionality.
3.3.2. Concealed Service Charges for BYOD
The following steps can be followed to protect the mobile devices from various security breaches.
Since the evolution of mobile device utilization is getting matured, the support for organization for achieving their goal remains incompatible. Further issues are also confronted in BYOD implementation.
In future BYOD implementation, the confidentiality legislation will be increased. Well-organized and clear confidentiality procedures are included for designing the BYOD safety mechanisms. For preventing these issues, many organizations are solving the security issues through BYOD strategy.
The data safety is pertained not only for the enterprise data in BYOD implementation. The information gathered from the employees like employee’s gadget, intention, safety, termination, etc. are depicted clearly in the security policy of the organization. An assessment of all the encountered risks are also conducted by the organization based on its defined policy.
If the employee information is accessed by the third-party for cloud email implementation, the information must be secured by a clearly described agreement. Since information transparency is followed in BYOD deployment, the process of data protection must be acquiescence verified.
Many laws, wiping, and monitoring requirements are defined by the organizations where BYOD platform is deployed. The defined privacy laws do not allow the organization to view the personal details of the employees. This imposes a limitation for monitoring and administering the data distributed through mobile devices for ensuring safety.
For avoiding this type of control pitfalls, the software should be chosen for examining the content exclusively for work centralized tasks.
If any incident is occurred, the organization should possess rights to examine the employee’s devices for preventing the breaches. If this type of rights are not allowed in the BYOD security policy, many legal issues and delays will be faced by the organizations while examining the data on the employee’s personal devices. Some exceptions for providing notifications are offered since the new legislation trend is designed to tackle with the data breach if some of the data protection condition is met by the organization
By maintaining an active portfolio of device catalogs, safety controls, and data stored on the devices, the organization can be prepared for this type of legislations (Ballagas, Rohs, Sheridan, Borchers, 2013).
The safety policy settings are mainly supervised by the term “Ownership”. This results in the implementation of different sets of security policies and procedures for the personal and organizational devices. If the device is lost or damaged, the data can be recovered easily since the official laptop is shifted to personal devices.
A clear security policy asserting the data owner, the person (Corporate or private) holding the task of administering the data backups is defined for mitigating the unstructured liability for data backup in BYOD environment.
The regulatory risks can be handled in several ways as given below:
Below are the steps suggested for increasing the confidence level among employees and to proffer assurance to the company stake proprietors that the data security cannot be damaged by the utilization of employee gadgets in their workplace.
By incorporating the scalable and adaptable BYOD strategies and security policies and by influencing the organization risk-averse processes, the organizations will be able to tackle all the risks and challenges associated with their security framework due to the employment of BYOD environment.
The preamble of suitable security policies and constant threat detection assists the enterprises to become more efficient and to transform their employees conscious of the risks confronted due to the utilization of employee’s personal devices.
AirWatch. (2012). Enabling bring your own devices (BYOD) in the enterprise. Retrieved from https://www.ciosummits.com/media/solution_spotlight/byod-whitepaper.pdf
Ballagas, R., Rohs, M., Sheridan J. G., & Borchers J. (2013). BYOD: Bring your auditing device. Retrieved from https://www.vs.inf.ethz.ch/publ/papers/rohs-byod-2004.pdf
Brad, S., Trinkle, R., Crossler, E., & Warkentin, M. (2014). I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks. Journal of Information Systems, 28(2), 307-327.
Cisco. (2012). BYOD: A global perspective (Survey report). Retrieved from https://www.cisco.com/web/about/ac79/docs/re/BYOD_Horizons-Global.pdf
Cook, T. (2013). Mobile innovation applications for the BYOD enterprise user. IBM Journal of Research and Development, 5(6), 10-18.
Drew, J. (2012).Managing cybersecurity risks. Journal of Accountancy, 30-50.
Edwards, C. (2013). Identity: The new security perimeter. Computer Fraud & Security, 18-19.
Forrester, E. (2012). Key strategies to capture and measure the value of consumerization of IT. Retrieved from https://www.trendmicro.com/cloud-content/us/pdfs/business/white-papers/wp_forrester_measure-value-of-consumerization.pdf
Gajar, P. K., Ghosh, A., Rai, S. (2013). Bring your own device (BYOD): Security risks and mitigating strategies. Journal of Global Research in Computer Science, 4(2), 62-70.
Gessner, D., Girao, J., Karame, G., & Li, W. (2013). Towards a user-friendly security-enhancing BYOD solution. NEC Technical Journal, 7(3), 113-116.
Grover, J. (2013). Android forensics: Automated data collection and reporting from a mobile device. Retrieved from https://scholarworks.rit.edu/cgi/viewcontent.cgi?article=5389&context=theses
Johnson, K. (2012, March). BYOD security survey (A SANS white paper). Retrieved from https://www.sans.org/reading-room/analysts-program/mobility-sec-survey
Krahel, P., Miklos, A., & Vasarhelyi, S. (2014). AIS as a Facilitator of Accounting Change: Technology, Practice, and Education. Journal of Information Systems, 28(5), 1-15.
Leavitt, N. (2013). Today’s mobile security requires a new approach. IEEE Computer Society, 46(4), 16-19.
Li, F., Peng, W., Huang, C., & Zou, X. (2013). Smartphone strategic sampling in defending enterprise network security. IEEE International Conference on Communications, 20(3), 57-84.
Polla, M. L., Martinelli, F., & Sgandurra, A. (2013). A survey on security for mobile devices. IEEE Communications Surveys & Tutorials, 15, 446-470.
Ripley, C. (2013). Take advantage of BYOD without sacrificing security. Retrieved from https://www.pcworld.com/article/203 8163/take-Advantage-ofbyod-without-sacrificing-security.html.
Robert, E., Crossler, J., Long, H., Tina, M., Loraas, B., & Trinkle, S. (2017). The Impact of Moral Intensity and Ethical Tone Consistency on Policy Compliance. Journal of Information Systems, 31(2), 49-64.
Singh, N. (2012). BYOD genie is out of the bottle—“Devil or angel. Journal of Business Management & Social Sciences Research, 1, 1-12.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Ethical Tone Consistency Policy Compliance. Retrieved from https://myassignmenthelp.com/free-samples/ethical-tone-consistency-policy-compliance.
"Ethical Tone Consistency Policy Compliance." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/ethical-tone-consistency-policy-compliance.
My Assignment Help (2019) Ethical Tone Consistency Policy Compliance [Online]. Available from: https://myassignmenthelp.com/free-samples/ethical-tone-consistency-policy-compliance
[Accessed 27 May 2020].
My Assignment Help. 'Ethical Tone Consistency Policy Compliance' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/ethical-tone-consistency-policy-compliance> accessed 27 May 2020.
My Assignment Help. Ethical Tone Consistency Policy Compliance [Internet]. My Assignment Help. 2019 [cited 27 May 2020]. Available from: https://myassignmenthelp.com/free-samples/ethical-tone-consistency-policy-compliance.
MyAssignmenthelp.com is one of the noted service providers that deliver essay help. We provide tailored essay assistance to make sure that student gets online essay help exactly in the way they want it to be written. We at MyAssigemnthelp.com have built teams of consultants, who readily attend every query related to help me writing my essay. We provide essay writing help in forms of tips and steps in order o assist students with tough essay assignments.
Answer: Title: Reduction Of Construction Wastes During Construction Work Of Large Scale Projects In Developing Countries Section 1: Annotated Bibliography Miquel Casals, Núria Forcada, Marcel Macarulla, Analysis of the implementation of effective waste management practices in construction projects and sites, December 2014, Volume 93, 38 “Current waste generation rates are still below predicted levels, and the infrastru...Read More
Answer: Lodgement classification: The frequencies of agent lodgement is found by the excel formula: “=COUNTIF(C2:C1001, "=1")”. The frequencies of self lodgement is found as: “=COUNTIF(C2:C1001, "=2")”. Proportions are counted by each count/total frequency. By clicking “Insert”, then “Pie”, pie chart is generated. The axes, borders are decorated by right clicking “Format chart area&r...Read More
Answer: Introduction The report helps in analysing the different kind of business activities along with analysis of the service delivery along with manufacturing process of the Sky Plc Company. Proper identification of the different strategies will help in improving the different processes of manufacturing as well. Proper discussion is essential in nature wherein it has helped in making the organization successful or not successful in n...Read More
Answer: Introduction Pepsi Company is among the largest manufacturer of snack and crisp with very high annual sales. The company is also known for its manufacture of carbonated drinks. However, Pepsi Company is not only known for the products it manufactures but also for their methods of production. The company is very creative and innovative in their activities where the company invented various brands of sale instead of selling one particul...Read More
Answer: Dear Christopher, We are extremely happy to see that you have remembered us and that is why we would like to show our gratefulness in response to the mail that you have sent to us. We cannot express our joy to see that that you have written to us and we assure you to provide you with the best solution that is available. With those possibly the best solutions it will become easy for you to make the right choice and that also in an appr...Read More
Just share Requriment and get customize Solution.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
very good writings, good references and really good pronunciation. would do here again the other time. very recommended!!!
must be a stupid expert who finished my assignment, don\'t trust it when they say, how good they are. They are all lies!!! i paid 148 dollars for 1000 words, and got less than 50%.!
It was good and was satisfied with this. This is completed and was passed right away after the presentation. Thank you!
They did a good job but this time i was no happy that much because i feel i need to let them again and again then even they did't done proper what i need but anyway once happend otherwise other all are mine good and i clear too