Investigating Information Security Risks of Mobile Device Use within Organizations

نویسندگان

  • William Bradley Glisson
  • Tim Storer
چکیده

Mobile devices, such as phones, tablets and laptops, expose businesses and governments to a multitude of information security risks. While Information Systems research has focused on the security and privacy aspects from the end-user perspective regarding mobile devices, very little research has been conducted within corporate environments. In this work, thirty-two mobile devices were returned by employees in a global Fortune 500 company. In the empirical analysis, a number of significant security risks were uncovered which may have led to leakage of valuable intellectual property or exposed the organization to future legal conflicts. The research contribution is an initial empirical report highlighting examples of corporate policy breaches by users along with providing a foundation for future research on the security risks of the pervasive presence of mobile devices in corporate environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The impact of information technology on health

Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...

متن کامل

Securing BYOD: A Study of Framing and Neutralization Effects on Mobile Device Security Policy Compliance

Because of the recent increase of mobile device adoption in the workplace, and the numerous security risks inherent in mobile device use, there is a growing need for organizations to craft mobile device security policies that will have a positive effect on employees’ intention to comply. Using prospect theory, developed by Kahneman and Tversky (1979), and the framing effects associated with thi...

متن کامل

Investigating the Effective Factors on Mobile Learning in Medical Education Based on FRAME Model

Introduction: With regard to an increase in use of modern communication technologies including mobile facilities and their application in learning and training, taking quality and users’ needs into account is a fundamental matter. In this article, an attempt has been made to investigate the factors influencing mobile learning from the perspective of M.S. and Ph.D. medical sciences students stud...

متن کامل

A framework towards governing "Bring Your Own Device in SMMEs"

Information is a critically important asset that has been used for decades within organizations. Like any asset, there are threats to the information that impact processes such as; email retrieval and access to organizational system services. As a consequence of the threats, attention to the security of the information is important. Technology is utilized to secure information and the cost affi...

متن کامل

The Need for BYOD Mobile Device Security Awareness and Training

In 2013, people will purchase 1.2 billion mobile devices, surpassing PC’s as the most common method for accessing the Internet. The leading two mobile device platforms, Android and iOS, both have security concerns surrounding their operating systems and application markets. The popularity of Bring Your Own Device (BYOD), where employees use their own devices for both personal and work situation...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1309.0521  شماره 

صفحات  -

تاریخ انتشار 2013