This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Mobile Penetration and Risks of Cloud Computing

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Mobile Penetration and Risks of Cloud Computing

Question 2(A): In consideration of this revelation, identify and name these factors and provide a brief discussion about them?

Firstly, the factors accelerating the use of mobile computing include the use of robust networks and devices (Elton et al., 2017). At the moment, the mobile phone can operate using multiple processors and also have large storage capacities. Also, the mobile phone has enormous bandwidths with the capability of utilizing wireless networks such as 3G and 4G. Secondly, the high usage of mobile devices is due to the widely available applications pre-integrated in phones. The availability of mobile apps in the market has, therefore, increased the use of mobiles. Thirdly, the extensive utilization of mobile computing is due to the provision for competitive advantage. Several organizations utilize mobile computing for easy interactions with the customers, hence creating a competitive advantage over other companies (Elton et al., 2017). Fourthly, the use of cloud computing has increased the use of mobile devices because of data shared across devices through cloud storage. Finally, the use of mobile devices has increased due to the executive interest of companies and organizations. For instance, many companies reward executive workers with the latest mobile gadgets such as IPad, hence the wide use of mobile computing

Question 2(B): Even with this great news about the benefits of cloud computing applications, the authors have warned the business user community regarding the dangers associated with cloud computing applications.  Please identify and name these grave dangers/risks that pose as concerns, and briefly support your discussion.

Firstly, the risks that accompany the utilization of cloud computing include the loss of intellectual property rights (Grobauer et al., 2010). For instance, most of the companies store sensitive information on their web-based storage system, which risk breaching by cybercriminals. Secondly, most of the regulatory bodies for cloud computing, such as BYOC, fail to comply with mandates given to them for the protection of data. Hence the security of user data is at risk due to noncompliance with Mobile regulatory bodies. Thirdly, the use of cloud computing comes with the risk of losing control over actions by the user (Grobauer et al., 2010). For instance, sensitive information accessed by an employee can pose the risk of sabotaging an organization or company. Finally, the use of computer cloud services can destroy devices through malware and computer viruses, hence risking the loss of user data or information.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Elton, T. B. A. M., Feltkamp, V., & Maastricht School of Management. (2017). Market penetration of mobile data services: Factors that increase service adoption: a tale of two countries. Maastricht: Maastricht School of Management.

Grobauer, B., Walloschek, T., & Stocker, E. (2010). Understanding cloud computing vulnerabilities. IEEE Security & Privacy, 9(2), 50-57.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask