age of mobile phones, discussion help

Even the smartest students need writing assistance at some point during their academic career. Should you lock yourself in a room and spend the entire weekend trying to write a paper? We promise you that the paper that you pay for won’t be resold or submitted elsewhere. It will also be written according to the instructions that you and your professor provide. Our excellent essays stand out among the rest for a reason. Don’t just take our word, check them out by yourself.

Order a Similar Paper Order a Different Paper

Respond to each question in 150 words

1 of 2


In the age of mobile phones at devices you would think our problems would become less complicated and our lives would be easier. As we soon found out social media, cloud computing, and smart phones brought about a number of benefits, but also some major headaches for IT and computer specialists. The lines of work and personal time have become more and more blurred to the point where it’s a grey area. From a security stand point these technologies have opened up major holes that need to be covered.

To begin, social media has invaded every aspect of people’s lives included our work life. Depending on the work environment this could pose some problems. Often, IT departments will block access to websites to keep people from using them during the work day. If a situation comes up they may need to conduct investigations and be handling peoples personal emails and documents. Additionally, it can be an operational security hazard. Social media has been the cause of several incidents within the coast guard. Hence the old saying “loose lips sink ships.”

Nowadays almost everyone has a mobile device. These hand held computers create even more issues especially with government and government contract companies handling secret information. There are many spaces in government facilities that are will require the employees to remove any mobile devices and lock them up until they leave from work.

Lastly, many organizations rely on cloud computing to save and backup data. It’s important to realize this also creates a number of issues. Keeping a good check on who has access and who doesn’t is a critical task. When employees come and go they will need access removed or added.

2 of 2

For those of us who don’t own our own business work for a company of corporations of some sort. Our employers have rules and regulations we must adhere to that protect them as well as their employee’s from possible legal repercussions. For example, companies have the right to monitor any activity taken place on company property; this is especially true when it comes to the use of company computers. However, this type of monitoring could lead to ethical issues by individuals whose job responsibility might requires them to do so, which are normally an IT professional. IT personnel often have access to confidential data and knowledge about individuals’ and companies’ networks and systems that give them a great deal of power (Shinder, 2005). They have the ability to access employee’s emails, monitor the web sites visited, and read employees personal documents stored on companies servers. These are all ethical issues IT personnel should be aware of and never abuse.

In an article post by Industry Perspectives in 2014 stated, “just as core technologies, the essential ethical principles of IT remain unchanged with the advent of cloud computing. And even though the governing ethics remain largely unchanged, it is important to reexamine them, especially in light of the fact that so much of what used to be entirely internal considerations of operations and risk management, has been entrusted to providers and individuals who sit well outside direct organizational control”. Companies are becoming less reliant on their IT personnel by hiring third party vendor to do work typically done by IT departments. In all, IT professionals should have integrity, be trustworthy, and have great work ethic. Hiring individuals with these traits should all but eliminate any ethical issues.

Shinder, D. (Aug 2005). Ethical issues for IT security professionals. Computerworld. Retrieved from…

Do you need help with this or a different assignment? In a world where academic success does not come without efforts, we do our best to provide the most proficient and capable essay writing service. After all, impressing professors shouldn’t be hard, we make that possible. If you decide to make your order on our website, you will get 15 % off your first order. You only need to indicate the discount code GET15.

Order a Similar Paper Order a Different Paper