Information Systems Management Information Systems Research Paper

Total Length: 705 words ( 2 double-spaced pages)

Total Sources: 1

Page 1 of 2



Cloud computing is a trend in technology providing cost control and real agility business benefits. Nevertheless, services based on cloud computing are currently floating outside privacy and security standards, which is likely to be decades old thus failing to address concerns such as shared tenancy and virtualization (Gibson, 2011). Similarly, cloud computing comes with more challenges; providers of cloud services are likely to outsource third party experts and if such links are not secure, they have high chances of influencing the entire security level of cloud computing. In extreme occasions, other services provided by cloud, such as resource sharing and multi-tenancy have chances of introducing what is commonly known as class breaks if the mechanisms separating routing, memory and storage may fail. In the end, doors to data theft, invalidated assurance levels, and service disruptions may be opened for both the clients and the providers of cloud services (Gibson, 2011).

Stuck Writing Your "Information Systems Management Information Systems" Research Paper?



Corporations are adopting the trend of using smart phones as a technology phenomenon and the capabilities and power of this device has categorized them as critical tools for enterprises. Nevertheless, the use of cell phones for mixed business tasks and social applications by employees has presented security challenges. Employees have not exercised rigor in separating personal data and corporate data raising issues about the integrity of using smart phones for business purposes (Zhang & Galletta, 2006). Smart phones engage various channels among them texting, social media, email and voice. This paves way for the device to work seamlessly with such alternative devices. In the end, compromising a single smart phone may result into damages that spread to more users of smart phones, as well as the large enterprise. This can be a source of treasure trove of useful data where hackers can access sensitive information for sophisticated attacks on social.....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Information Systems Management Information Systems" (2013, March 30) Retrieved May 18, 2024, from
https://www.aceyourpaper.com/essays/information-systems-management-information-87096

Latest MLA Format (8th edition)

Copy Reference
"Information Systems Management Information Systems" 30 March 2013. Web.18 May. 2024. <
https://www.aceyourpaper.com/essays/information-systems-management-information-87096>

Latest Chicago Format (16th edition)

Copy Reference
"Information Systems Management Information Systems", 30 March 2013, Accessed.18 May. 2024,
https://www.aceyourpaper.com/essays/information-systems-management-information-87096