Mental & Emotional Health
The smart phone has changed our behavior, sometimes for the better because we are now able to connect and engage with many more people than ever before, but sometimes for the worse in that we may have become over-reliant on the connectivity with the outside world that these devices afford us. Either way, there is no going back for the majority of users who can almost instantaneously connect with hundreds if not thousands of people through the various social media and other applications available on such devices as well as through the humble phone call.
However, according to researchers at McMaster University in Ontario our dependence brings anxiety. The loss of one’s smart phone not only represents an immediate disconnection from one’s online contacts but is also a potential privacy and security risk should the lost phone wend its way into the hands of a malicious third party. In an article the August 2014 issue of the International Journal of Mobile Communications, Zhiling Tu, Yufei Yuan and Norm Archer outline the possible coping mechanisms that might be needed following loss or theft and the security problems that the user might face. The researchers point out that the same anxieties apply equally to lost or stolen laptops, tablet computers, and other digital devices.
A release from the publisher notes that the convenience of mobility, wireless communication, and the information processing power of smart phones and other portable digital devices has led to more and more people carrying with them valuable data assets wherever they go. These assets may include personal and business contacts, private pictures and videos, meeting and lecture notes and the like, banking details, utility statements, company spreadsheets, and much more. All such assets are potentially sensitive to abuse by third parties.
The researchers add that because many companies now have a BYOD (bring-your-own-device) policy rather than dispensing a standard corporate device to all employees, there are additional security issues that arise. The value of lost hardware might be negligible when compared to the loss of sensitive or proprietary data. Perhaps more troubling is that while there are various countermeasures that can be used to cope with mobile device loss and theft, users are either unaware of their existence or unwilling to use them. The cost and convenience of security countermeasures also need to be weighed.