Mobile Penetration and Risks of Cloud Computing
Question 2(A): In consideration of this revelation, identify and name these factors and provide a brief discussion about them?
Firstly, the factors accelerating the use of mobile computing include the use of robust networks and devices (Elton et al., 2017). At the moment, the mobile phone can operate using multiple processors and also have large storage capacities. Also, the mobile phone has enormous bandwidths with the capability of utilizing wireless networks such as 3G and 4G. Secondly, the high usage of mobile devices is due to the widely available applications pre-integrated in phones. The availability of mobile apps in the market has, therefore, increased the use of mobiles. Thirdly, the extensive utilization of mobile computing is due to the provision for competitive advantage. Several organizations utilize mobile computing for easy interactions with the customers, hence creating a competitive advantage over other companies (Elton et al., 2017). Fourthly, the use of cloud computing has increased the use of mobile devices because of data shared across devices through cloud storage. Finally, the use of mobile devices has increased due to the executive interest of companies and organizations. For instance, many companies reward executive workers with the latest mobile gadgets such as IPad, hence the wide use of mobile computing
Question 2(B): Even with this great news about the benefits of cloud computing applications, the authors have warned the business user community regarding the dangers associated with cloud computing applications. Please identify and name these grave dangers/risks that pose as concerns, and briefly support your discussion.
Firstly, the risks that accompany the utilization of cloud computing include the loss of intellectual property rights (Grobauer et al., 2010). For instance, most of the companies store sensitive information on their web-based storage system, which risk breaching by cybercriminals. Secondly, most of the regulatory bodies for cloud computing, such as BYOC, fail to comply with mandates given to them for the protection of data. Hence the security of user data is at risk due to noncompliance with Mobile regulatory bodies. Thirdly, the use of cloud computing comes with the risk of losing control over actions by the user (Grobauer et al., 2010). For instance, sensitive information accessed by an employee can pose the risk of sabotaging an organization or company. Finally, the use of computer cloud services can destroy devices through malware and computer viruses, hence risking the loss of user data or information.
References
Elton, T. B. A. M., Feltkamp, V., & Maastricht School of Management. (2017). Market penetration of mobile data services: Factors that increase service adoption: a tale of two countries. Maastricht: Maastricht School of Management.
Grobauer, B., Walloschek, T., & Stocker, E. (2010). Understanding cloud computing vulnerabilities. IEEE Security & Privacy, 9(2), 50-57.