1Q. The authors assert that the use of mobile devices in our society today has indeed become ubiquitous. Research indicates that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors. Identify these factors, and discuss some of the security risks associated with mobile computing that would need to be considered in an information goverance program.
Do you need high quality Custom Essay Writing Services?
2Q. In chapter discusses privacy and security within information governance. Explain why focusing on perimeter security is not sufficient to secure our information assets. What would you recommend as an alternative?