Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Application: Managing Electronic Transactions Through Mobile Devices

Mobile devices offer quick access to resources and enable electronic transactions from practically anywhere. The emergence and evolution of mobile devices have opened up a new domain of security concerns: mobile security. Mobile devices, if not properly secured, can cause great damage to the user and to the user's organization.

Consider the following scenario: You are the manager of IT for a fast growing company. The company plans to take advantage of cutting edge technology as one of its competitive approaches to gain market share. It is planning to equip its sales people with mobile devices to take orders from customers. In addition, it is planning to enable its delivery and installation people to process credit card payments from customers upon delivery and installation of the systems, through a wireless credit card payment processing system.

The company recognizes that there are security issues related to electronic transactions using mobile devices. Every time an employee submits a transaction, the information is transferred from the mobile device to the appropriate department over an Internet connection. The company is also concerned that the personal use of company mobile devices will put them at greater risk of malware and other forms of compromise. Loss of sensitive consumer information can result in loss of reputation and potentially lead to legal actions against the company.

The Chief Information Officer (CIO) of the company has asked you to find a way to use mobile devices, in a secure way, to prevent data leakage.

For this Assignment, based on your readings and through additional research, develop a 4- to 6 page proposal that describes and evaluates applicable security management solutions for the company. Include the following points:

  • Explain the security threats the employees' mobile devices may be subjected to. For threats pertaining to electronic transactions, explain countermeasures.
  • Based on the best practices for mobile security, describe which of these countermeasures you believe would be most effective. Justify your choices.
  • Propose a security management solution that meets the business requirements. Include tools, processes, and policies required to implement the solution.

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M92427305
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Business Management

How suitable to the workplace are career development plan

How suitable to the workplace are 'career development plan' template?

Why isnt the gross domestic product gdp a good measurement

Why isn't the Gross Domestic Product (GDP) a good measurement tool for the economy?

Why is it important to design potential alternate

Why is it important to design potential alternate strategies?

Under the behavioral school of management what would you

Under the behavioral school of management, what would you consider as the "red tape"?

Arrows theorem that states there is no true fair method for

Arrow's Theorem that states there is no true fair method for voting. Do you agree or disagree with this statement? Why?

Determine what traits you need to work on the most to

Determine what traits you need to work on the most to become a good leader. Then, explain whether these traits differ from the strengths you need to be a good manager

Identify as many examples as you can that illustrate

Identify as many examples as you can that illustrate Planning, Organizing, Implementing and Controlling. Also, compare and contrast the leadership styles of Danny Ocean and Terry Benedict.

Discuss how we need to look into new technology and

Discuss how we need to look into new technology and methodology to improve the congestion of transportation and logistics?

The relationship between the activities of believing and

The relationship between the activities of believing and perceiving is complex and interactive. On the one hand, your perceptions form the foundation for many of your beliefs. On the other hand, your beliefs about the wo ...

You often read in the newspapers that the fed has just

You often read in the newspapers that the Fed has just lowered the discount rate. Does this signal that the Fed is moving toward a more expansionary monetary policy? Why or why not?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As