Free Essay

Cmgt 441 Week 2

In: Computers and Technology

Submitted By densluv
Words 475
Pages 2
Information Security and Phone Users

Information Security and Phone Users
Infosecurity magazine released an article today December 3, 2012 titled “Phone Users Worry About Security, but Won’t Pay for It. Information security is heavy on most people’s minds these days. The running risk of identity theft, hacking, and viruses leaves people feeling uneasy at times, but often they are also considering the risk to the information stored on or used with their cell phones. The people who are considering the information security with their cell phones are more often than not, unwilling to pay for it, and that is what that article addressed.
The Statistics
The article discusses a survey done of 1026 cell phone users in the UK (United Kingdom), most of them did express a concern about information security within their mobile device . Of those 1026 users, 38% (389.88 users) felt it would be the service providers fault if there was an information security breech. 32% (328.33 users) felt they would most likely blame themselves if their information was stolen, while 18% (184.68 users) would blame the cell phone manufacturer. When questioned further, a startling 68% of users were unwilling to pay for information security, and 24% were unwilling to pay more than £1 (about $1.30) per month to pay for added security, that is a total of 943.92 people.
The Attitude
This is interesting information, it is curious why people who are clearly concerned about the possibility of their information being stolen would be unwilling to pay for a service or software to protect it. Peter Doggart, a gentleman referenced in the article, felt these statistics reflected general confusion toward security. He stated “Smartphone users, like most people, don’t think about the security of their devices until they’ve been hacked”. This attitude about security is a bit disheartening. If people are unwilling to pay for security before being hacked and then more likely to simply switch providers after being hacked, the real issue never gets dealt with. The good news for people thinking this way in the US is that there is plenty of Information Security software available for free, or for a low onetime cost.
The Conclusion
There is no excuse for leaving information unsecure, even on a mobile device. Simply waiting around wondering if they will be hacked until they get hacker and then switching providers, as though this will solve the problem, shows a complete misunderstanding of the actual issue. Until people are better educated about information security, this will most likely remain a common trend, people will continue to wonder if their information is safe but not protect themselves.
Phone users worry about security, but won’t pay for it. (2012). Retrieved from…...

Similar Documents

Premium Essay

Cmgt 441 Week 5 Security Policy to provide these tools, McBride Financial employees must know these guidelines and follow them as they may be held liable for any violation of the contents of this policy. 2. General Use and Ownership 1. All data created by McBride's employees is the property of McBride Financial Services. McBride's data should never be placed on an unauthorized device, moved, altered, deleted, or sold without the consent of IT Security. 2. Employees are required to use good judgment when on the internet. While IT Security has implemented UTM systems to restrict the personal use of internet, employees are still responsible for any rogue executables or malware in which they download from their e-mail. If an employee feels they are visiting a website in which they should not be allowed, they should contact IT security immediately at immediately. 3. McBride IT Security has the right to monitor all networks, systems, and traffic at any time. 4. McBride IT Security can audit networks, systems, and traffic at any time. 3. Unacceptable Use The following activities are strictly prohibited and not allowed under any circumstance: 1. Sharing of any trade secrets, intellectual property, or McBride Financial's data without authorization. 2. Use of pirated software of any kind. 3. Streaming Music such as but not restricted to only; Real Player, Pandora, Live365 4. Introduction of malicious programs into the......

Words: 792 - Pages: 4

Free Essay

Cmgt 400 Week 2 Team

...inputs used by programs in the production useful information. • Hardware – This category includes the computers, peripherals, servers, I/O devices, storage and communication devices. • People – This category refers to users of the information system. Though this category is often over-looked, people are most influential element in the information system’s success or failure. • Procedure – This category refers to policies and rules governing processes pertaining to information systems. • Software – This category refers to computer programs that control functions within systems for the production useful information from data. Support manuals are also included in this category. Most Critical Threats to Kudler From the list of threats (Table 2), Learning Team “A” ranked the threats based on what we felt to be the most critical. From the list, we categorized each risk into three distinct security classifications: • High (H): Possibility of causing extremely serious personal or organizational injury, including any of the following: o Financial harm – extreme loss of capital/assets, imposition of extreme penalties/sanctions o Operational harm – severe loss of operation control, breach of contract/regulatory standard, prolonged loss of public trust o Personal harm – loss of life, limb, or extreme danger to public safety • Medium (M): Possibility of causing serious personal or organizational injury, including any of the following: o Financial harm – significant loss of......

Words: 1352 - Pages: 6

Premium Essay

Cmgt 442 Week 2 Individual

...Week 2 Individual Assignment Huffman Trucking started in 1936 in Cleveland, Ohio with just one tractor-trailer doing contract hauling in the same area. During World War II when the demand for moving of goods grew the company from 16 to 36 trailers by the end of the war. When the Motor Carrier Act of 1980 was passed, which deregulating the trucking industry, Huffman became a national carrier. The company does work for the Government, Auto manufacturing, consumer electronics, as well as raw materials. The company has union and non-union workers employed at its locations. This new benefits system is for both employee types to track their benefit information. The risks are many for this type of system as the type of data is the employee’s personal information. The information that needs protecting include Social security numbers, bank accounts numbers, their salaries and all the information that an identity thief would need to steal someone’s identity or use for other nefarious purposes. What risks are there in this new benefits election system? The benefits election system is the system that tracks all the benefits that the employees get from Huffman trucking as part of the compensation for working there. This includes heath care coverage, dental, vision, 401k, and anything else that needs tracking in the employees benefit packages. The data that is needed for this system are all the things that define a person in the United States. The risks that need addressing with this......

Words: 1192 - Pages: 5

Premium Essay

Cmgt 410 Week 3

...Week 3 Assignment: Project Budget By: Jane Morales CMGT/410 Project Planning and Implementation Instructor: Don Beetle 3/23/2013 Memorandum To: Jim Klondike COO From: Jane Morales Date: 5/23/2013 RE: Project Budget The go ahead has been giving to move forward with the two-day offsite training for the branch managers. The memo will explain the budget expenditures for this project and break down the costs, timing, and resources needed to make this project a success. This budget will cover the cost of the trainer, accommodations, materials needed for the training, and any other monetary expenditures necessary to complete the training. A median trainer will cost $27.33 an hour (U.S. Department of Labor), at 8 hours each of the two-day training the trainer will cost $437.28 for the two days. The managers will be getting paid a training pay rate of $15.00 an hour; there are a total of 16 managers attending for a total of $3,840.00 Next the accommodations for trainer and 16 managers at the Double Tree Inn will cost $279.00 (one room) for the trainer and $274.00 (8 two bed rooms) for the managers who will be staying two to a room. This will run $2,255. Then the cost of a banquet room to hold the trainings in will cost $1,000 (special pricing), luckily the hotel has audio/video equipment that will be rolled into the cost of the rooms and banquet hall. Next the cost of airfare for those who will have to fly in (8 @ $215 each), the rest will......

Words: 436 - Pages: 2

Premium Essay

Cmgt 400 Week 4 Dqs

...This archive file of CMGT 400 Week 4 Discussion Questions comprises: DQ 1: Post a 150-200-word response to the following discussion question by clicking on Reply. What are the top three areas that an organization should work on to respond to the issues raised in the de Villiers (2010) article? Why are these areas critical to the organization? Is the author Deadline: ( ), Computer Science - General Computer Science Group Project: MiniQuest Database Objective | Overview | Case Project Overview | Needed Reports | Sample Data | Some Known Assumptions | What Your Team will be Required to Do | Task 1 (Due at the end of Week 3) | Task 2 (Due at the end of Week 4) | Task 3 (Due at the end of Week 5) | Task 4 (Due at the end of Week 6) | Task 5 (Due at the end of Week 7) | Submission of Tasks | Team Member Responsibilities | Assessment | Grading Rubrics Objective The project for CIS336 is designed to touch all aspects of the fundamental concepts of database design and logical data modeling covered during the class. The project is team centered and each team will be responsible for designing, developing, and demonstrating the functionality of a database created based on a defined set of business specifications. At the end of the session, each project team will submit the database designed by the team and demonstrate the database's ability to deliver the required information as outlined in the project specifications....

Words: 359 - Pages: 2

Premium Essay

Cmgt 445 Week 5 Dqs

...This archive file of CMGT 445 Week 5 Discussion Questions shows the solutions to the following problems: DQ 1: Fowler and Horan (2007) noted that despite on-going advancements within the information systems profession, there are still a great many failures and abandonment of IS projects. What would you say may have been some of the contributing factors in these failures and how might they have been better managed? DQ 2: Simon and Paper (2007) explore the topic of user acceptance to new technologies; in this case voice recognition technology. Reviewing the general constructs of the TAM model the author General Questions - General Academic Questions CMGT 445 WEEK 1 SUPPORTING ACTIVITY 1 CMGT 445 WEEK 1 SUPPORTING ACTIVITY 2 EVOLUTION OF TECHOLOGY CMGT445 Week 1 DQs CMGT 445 Week 2 Article Review CMGT 445 Week 2 Individual Assignment Managerial Issues CMGT 445 Week 2 LT Business Case for Investment Outline CMGT445 Week 2 DQs CMGT 445 Week 2 Supporting Activity Competitive Advantage CMGT 445 Week 2 Supporting Activity Technology Innovation CMGT 445 Week 3 Activity Enterprise Resource Planning CMGT 445 Week 3 Article Review CMGT 445 Week 3 Supporting Activity Enterprise Systems CMGT445 Week 3 DQs CMGT Week 3 LT Assignment Business Case for Investment CMGT 445 Week 4 Article Review CMGT 445 Week 4 Individual Assignment Implementation Plan CMGT 445 Week 4 Presentation Preparation CMGT 445 Week 4 Supporting......

Words: 349 - Pages: 2

Premium Essay

Cmgt 445 Week 2 Dqs

...document of CMGT 445 Week 2 Discussion Questions shows the solutions to the following problems: DQ 1: Haddad and Ribi?re (2007) explore and expand upon the more formal use of Knowledge Management in the process of software acquisition. Analyze and discuss the use of the Software Acquisition Capability Maturity Model (SACMM) if you were the project manager responsible for a large software acquisition at your company. DQ 2: In what ways can changes in a business affect an application software development project? What are some of the tools a project manager can use to respond to changes that occur? DQ 3: Boehm and Bhuta, (2009) explore the risks associated with integrating an existing software component into a new application implementation project. Regarding the principles put forth on p. 60 of this article, go back and review a software development project you were a part of and discuss whether the application of the principles of these authors could have reduced the risk of that project. DQ 4: From a project management perspective, at what point in an application implementation project timeline should the mainframe computer or server hardware be specified and/or acquired? Identify two or three considerations for making sure that the right hardware is available at the right time. General Questions - General Academic Questions CMGT 445 WEEK 1 SUPPORTING ACTIVITY 1 CMGT 445 WEEK 1 SUPPORTING ACTIVITY 2 EVOLUTION OF TECHOLOGY CMGT445 Week 1......

Words: 359 - Pages: 2

Free Essay

Bshs 441 Week 2 Team Assignment Interview of a Social Service Agency Using Advocates-2

...In this pack of BSHS 441 Entire Course you will find the next information: BSHS 441 Week 1 DQ 1-1.doc BSHS 441 Week 1 DQ 2-1.doc BSHS 441 Week 1 Individual Assignment Paper on a Specific Population and the Advocate Role-1.doc BSHS 441 Week 2 DQ 1-1.doc BSHS 441 Week 2 DQ 2-1.doc BSHS 441 Week 2 Individual Assignment Literature Review of Mediation and Advocacy-1.doc BSHS 441 Week 2 Team Assignment Interview of a Social Service Agency Using Advocates-2.doc BSHS 441 Week 3 DQ 1-1.doc BSHS 441 Week 3 DQ 2-1.doc BSHS 441 Week 3 Individual Assignment Paper on the Challenges.doc BSHS 441 Week 3 Team Assignment Interview of a Social Service Agency on Their Use of Mediation-1.doc BSHS 441 Week 4 DQ 1-1.doc BSHS 441 Week 4 DQ 2-1.doc BSHS 441 Week 4 Individual Assignment Paper Based on Literature Review-1.doc BSHS 441 Week 4 Team Assignment Interview With a Social Services Lobbyist 1-1.doc BSHS 441 Week 5 DQ 1-1.doc BSHS 441 Week 5 DQ 2-1.doc BSHS 441 Week 5 Team Assignment Presentation on the Use of Mediation within an Agency Setting-1.pptx General Questions - General General Questions BSHS 441 Week 1 Individual Assignment Paper on a Specific Population and the Advocate Role BSHS 441 Week 2 Individual Assignment Literature Review of Mediation and Advocacy BSHS 441 Week 2 Learning Team Assignment Interview of a Social Service Agency Using Advocates BSHS 441 Week 3 Individual......

Words: 395 - Pages: 2

Premium Essay

Cmgt 410 Week 2 Individual

...from the same location. If this is not possible, transportation will need to be provided to and from the training. Additional time will also need to be schedule with the venue for setup prior to training, and tear down at the conclusion of the event. Training Training will begin with sign in at the registration tables. Registration tables should be divided into a minimum of 3 tables, equally split by first letter of attendees last name. Once a person has registered, they will be offered a light breakfast and beverages and then will be asked to make their way to their respective meeting location. Breaks will be provided every 90 minutes with a 1-hour lunch in the middle of training. At the end of the training class (end of day 2), all attendees will be asked to complete a short survey about the event. The questions will cover the material covered, the training venue, and the hotel accommodations....

Words: 536 - Pages: 3

Premium Essay

Cmgt 431 Learning Team Week 2

...CISSP Guide to Security Essentials Chapter 1 (pgs. 31-33) 1. An organization that needs to understand vulnerabilities and threats needs to perform a: Answer: c. Qualitative risk assessment (pg. 5) 2. A risk manager has performed a risk analysis on a server that is worth $120,000. The risk manager has determined that the single loss expectancy is $100,000. The exposure factor is: Answer: a. 83% (pg. 6) 3. A risk manager has performed a risk analysis on a server that is worth $120,000. The single loss expectancy (SLE) is $100,000, and the annual loss expectancy (ALE) is $8,000. The annual rate of occurrence (ARO) is: Answer d. 8% (pg. 6) 4. A risk manager needs to implement countermeasures on a critical server. What factors Answer b. Annualized loss expectancy (ALE) that results from the implementation of the countermeasure (pg. 7-8) 5. The general approaches to risk treatment are: Answer: c. Risk acceptance, risk avoidance, risk reduction, and risk transfer (pg. 8)   6. CIA refers to: Answer c. Confidentiality, integrity, and availability of information and systems (pg. 9-10) 7. A recent failure in a firewall resulted in all incoming packets being blocked. This type of failure is known as: d. Fail closed (pg. 12) 8. The definition of PII: b. Is name, date of birth, home address, and home telephone number (pg. 12) 9. The statement, “All financial transactions are to be encrypted using 3DES” is an example of a: c. Standard (pg. 181) 10...

Words: 377 - Pages: 2

Premium Essay

Mkt 441 Week 2 Learning Team Market Research Implementation Plan Problem Identification and Project Outline

...MKT 441 Week 2 Learning Team Market Research Implementation Plan Problem Identification and Project Outline To Buy This material Click below link Select an organization with which you are familiar. This organization will be the basis for your Market Research Implementation Plan. Be sure to obtain your instructor’s approval before beginning this project. Select a scenario from the following list: An organization is planning to introduce a new product/service in another country An organization is considering introducing a new product/service An organization is considering launching a new business unit An organization is considering pursuing a new geographical market An organization is considering adjusting the pricing of an existing product/service An organization is considering enhancing an existing product/service to meet expanding customer needs An organization wants to evaluate its perceived customer service Prepare a 700 to1050 word detailed outline of your Market Research Implementation Plan in which you address the following: Write an introduction describing your selected organization and scenario. Based on your selected scenario, identify the detailed areas in which market research is needed (e.g., population, target market, per capita) and describe their importance to the organization in the selected......

Words: 262 - Pages: 2

Premium Essay

University of Phoenix - Cmgt 430 - Week 2 Individual

...Week 2 Individual Assignment University of Phoenix – CMGT 430 In order to better serve Riordan Manufacturing’s information security infrastructure, a solid plan must be put in place to ensure that the approach to its implementation is logical, easy to follow, and effective. Many aspects must be considered when formulating an information security policy, including the needs of the company vs. best practice, thus striking a delicate balance between both variables. Therefore Smith Systems Consulting is dedicated to ensuring that a quality service is delivered that will meet these objectives. However, before a more comprehensive plan can be put into place, it is important that Smith Systems Consulting understands exactly how the security plan will be managed, and how to enforce it on the most basic level. It is therefore the opinion of our company to begin by defining a simple, yet utterly crucial part of Riordan’s base information security policy: separation of duties via the practice and implementation of role assignments. Separation of duties, in information technology, is the practice of dividing both IT staff and end users into managed groups, or roles. While users and IT staff, from an administrative level, may fall into several groups (ex., Accounting Department, Maintenance, Security, etc), these groups are not enough to enforce proper security policy. A more comprehensive approach is to define what the base access is for all of these groups, thus the use of roles....

Words: 1690 - Pages: 7

Premium Essay

Week 2 Ia Cmgt 530

...Personality Assessment University of Phoenix CMGT/530 Personality Assessment Personality is defined as the visible aspect of one’s characters based on a combination of their physical, mental, emotional, social, and other behavioral patterns. Over the last few decades there have been numerous methods and tests that have been developed to assess ones personality. The more commonly known tests include the Meyer-Briggs Type Indicator (MBIT), the Sixteen Personality Factor Questionnaire, the Jung Theory of Psychological Types and The Keirsey Temperament Sorter II. The listed methods are all developed by different individuals; with their very own views and opinions; however; each method is based on the basic theory that a person’s behavior are the results of specific traits that can be measured and it is these measureable traits are what make up a person’s inner habits and tendencies. There are several kinds of assessment methods that have been created to help define and measure ones individual personality and traits. For this assignment; the one used to assess my personality was the Keirsey Temperament Sorter II. The Keirsey Temperament Sorter II personality assessment tool; developed by David Kiersey was first introduced in his book Please Understand Me, which was published in 1978. It is an objective test composed of 70 questions that helps to measure and indicate the personality......

Words: 928 - Pages: 4

Premium Essay

Cmgt Week 2

...Project Task-list 7/1/2012 CMGT/410 Prof Lucas U.S. Immigration Customs Enforcement Stats Database The new database that is being developed and implemented into the U.S. Immigration Customs Enforcements offices will require some training and hands on practical application. This training is intended for each one of the shift supervisors from each one of the hubs around the U.S. and because of the short timeline of this project; the training will need to be conducted over two day span at one centralized location. In order to make something like this happen and for the Managers from each shift to get as must out of the training as they can this will take a lot of preplanning and a well-executed agenda that is backed by a long list of resources. Below is a list of the resources and their responsibilities to this project. * Project Management Team. * Determent the site for the training. * Ensure that there are adequate resources at this location; a training room to hold to amount of people that will be there and rooms for the managers to stay in. * Determine what local resources will need to be on site during the training like IT, HR, etc. * Disperse this information to each one of the HR departments at each ICE Hub. * Prepare a training schedule. * Get the training schedule approved by Head Quarters. * The HR Department: * Put together the list of shift supervisors. * Provide that list to; the Project......

Words: 445 - Pages: 2

Premium Essay

Cmgt 575 Week 5

...University of Phoenix CMGT - 575 Assignment from Sylabus: Prepare a 2-3 page narrative of your HR integaration project to explain you approach to the project’s sponsor, Hugh McCauley. Assignment Clarification from Questions & Comments Thread: This should be a personal narrative of your experience while working through the various stages of the assignment, using MS Project, comments, what would you have done differently, etc. ATTN: Hugh McCauley Service Request 004 for Riordian Manufacturing (SR-rm-004) asks to analyze the current human resource system to integrate the existing variety of tools in use today win a single integrated application (University of Phoenix Virtual Organizations, 2012). The current Human Resource Information System (HRIS) was installed in 1992 and was actually part of the financial systems package as part of the finance department. (University of Phoenix Virtual Organizations, 2012). Since the early 90’s, the advent and development of information technology has come to fruition thus making it more appropriate for a more technology centric group to take charge of the project. Although room for growth and elaboration was limited in the past, the legacy HRIS system kept track of the following: personal information, pay rate, personal exemptions, hire date, seniority date, organizational information and vacation hours. Changes to any of the above employee categories are made by submitting physical, hand written form by the employee’s manager and......

Words: 940 - Pages: 4