Identify The Issues And Risks That Concern The Organization ✓ Solved

Identify the issues and risks that pose concern to organizations

Assignment 1 Question 1: Identify the issues and risks that pose concern to organizations storing data in the cloud - briefly support your discussion. (At least 250 Words)

Question 2: Use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continued growth. From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them. (At least 250 Words)

Requirements: At least 250 Words to answer each question. APA 7, At least 2 references for each question. No plagiarism.

Paper For Above Instructions

Identifying Issues and Risks in Cloud Data Storage

As organizations increasingly adopt cloud computing solutions, they confront a variety of challenges and risks associated with storing data in the cloud. One primary concern is data security. With numerous high-profile data breaches reported in recent years, organizations must be vigilant about safeguarding sensitive data. Unauthorized access, whether from external hackers or internal personnel, poses a significant threat. Strong encryption methodologies and robust access control measures are essential to mitigate this risk (Pearson, 2013).

Another critical issue is compliance with regulatory frameworks. Organizations must navigate a complex landscape of local, national, and international laws governing data protection, such as the General Data Protection Regulation (GDPR). Non-compliance can lead to severe penalties and reputational damage (Rittinghouse & Ransome, 2017). Organizations must ensure that their cloud providers adhere to these regulations, which necessitates due diligence and continuous monitoring.

Moreover, the issue of data integrity cannot be overlooked. Organizations must ensure that their data remains accurate and unaltered during storage and retrieval processes. Any corruption or loss of data can have catastrophic implications for businesses, particularly in fields such as finance and healthcare (Subashini & Kavitha, 2011). Implementing solutions that provide regular backups and automated integrity checks is essential to protect against such risks.

Downtime and service availability also present considerable concerns. Cloud services, while generally reliable, are not immune to outages. Dependency on a third-party provider for essential services can lead to operational disruptions, loss of productivity, and financial repercussions (Zhang et al., 2010). Organizations should plan for business continuity strategies and evaluate providers thoroughly to ensure SLA uptime commitments are met.

Finally, vendor lock-in is a risk that can significantly impact organizations’ flexibility. Once businesses migrate to a specific cloud platform, transitioning to another provider may become cumbersome and costly due to compatibility and migration challenges (Marinescu, 2017). Organizations should conduct thorough assessments before choosing a cloud service provider, considering long-term implications and exit strategies.

Factors Accelerating Mobile Computing Popularity

The proliferation of mobile devices in contemporary society can be attributed to several factors. Firstly, technological advancements have drastically improved mobile device capabilities, making them more powerful than ever. The advent of smartphones and tablets has transformed the way individuals communicate, work, and socialize, enabling a mobile-first lifestyle (Chaffey, 2016).

Secondly, the extensive availability and affordability of mobile devices have contributed to their widespread adoption. According to the Pew Research Center (2021), a majority of the population now owns at least one mobile device, with decreasing prices and various financing options facilitating access (Pew Research Center, 2021).

Additionally, the rise of mobile applications has played a crucial role in driving mobile computing's popularity. With millions of applications available across various platforms, users find it easier to perform tasks and access information from anywhere, accelerating the trend towards mobile computing (stats from App Annie, 2021). These applications cater to diverse needs, enhancing productivity and facilitating communication.

Furthermore, improved internet connectivity, particularly with the rollout of 4G and now 5G technology, ensures that users have access to high-speed data on the go. This advancement not only enhances user experience but also underpins the growth of mobile services, fostering a more connected world (GSMA, 2020).

Lastly, cultural shifts toward remote working and flexible arrangements have solidified the position of mobile devices in our daily lives. The COVID-19 pandemic accelerated this trend, as individuals and businesses rapidly adapted to new working conditions, leading to further reliance on mobile technology (Dahl & Furrer, 2020). This has made mobile computing indispensable in the modern workplace.

Conclusion

In summary, the increasing reliance on cloud storage presents significant issues and risks for organizations, including data security, compliance, integrity, downtime, and vendor lock-in. Concurrently, the explosive growth of mobile computing is driven by advancements in technology, affordability, applications, connectivity, and shifting work cultures. Understanding these factors is crucial for organizations as they navigate the modern digital landscape.

References

  • Chaffey, D. (2016). Digital Marketing: Strategy, Implementation, and Practice. Pearson Education.
  • Dahl, L. A., & Furrer, M. (2020). The Importance of Mobile Technology for Business Success in Times of Crisis. Business Horizons, 63(4), 537-546.
  • GSMA. (2020). The Mobile Economy 2020. Retrieved from https://www.gsma.com/
  • Marinescu, D. C. (2017). Cloud Computing: Theory and Practice. Morgan Kaufmann.
  • Pearson, S. (2013). Privacy, Security and Trust in Cloud Computing. IBM Journal of Research and Development, 57(1), 1-11.
  • Pew Research Center. (2021). Mobile Technology and Home Broadband 2021. Retrieved from https://www.pewresearch.org/
  • Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud Computing: Implementation, Management, and Security. CRC Press.
  • Subashini, S., & Kavitha, V. (2011). A Survey on Security Issues in Service Delivery Models of Cloud Computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(2), 1-11.
  • Zhang, Q., Cheng, L., & Boutaba, R. (2010). Cloud Computing: State-of-the-Art and Research Challenges. Journal of Internet Services and Applications, 1(1), 7-18.
  • App Annie. (2021). The State of Mobile 2021. Retrieved from https://www.appannie.com/