2014
DOI: 10.1108/imcs-03-2013-0019
|View full text |Cite
|
Sign up to set email alerts
|

Mobile device security considerations for small- and medium-sized enterprise business mobility

Abstract: Purpose – This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, inves… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
70
0
3

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 82 publications
(74 citation statements)
references
References 13 publications
1
70
0
3
Order By: Relevance
“…The pervasiveness of mobile technology creates new threats to the security of organizational data (Harris & Patten, 2014;Ogren, 2008) and has blurred the line between using company-issued devices and personal devices in order to complete work tasks. The ready availability of personal devices often leads to increased employee productivity, albeit at the sacrifice of security.…”
Section: Research Implicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The pervasiveness of mobile technology creates new threats to the security of organizational data (Harris & Patten, 2014;Ogren, 2008) and has blurred the line between using company-issued devices and personal devices in order to complete work tasks. The ready availability of personal devices often leads to increased employee productivity, albeit at the sacrifice of security.…”
Section: Research Implicationsmentioning
confidence: 99%
“…Mobile technology includes phones, tablets, personal digital assistants (PDAs), gaming consoles, and e-readers (Harris & Patten, 2014). At 7.22 billion, the number of mobile devices exceeds the number of people in the world, which is approximately 7.19 billion (Boren, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…This list is adapted from Harris and Patten (2014), where a more detailed list of security practices was created for small businesses. These security practices apply regardless of whether the device is for personal or business use, but become particularly relevant in the BYOD context where employees are utilizing devices that the organization does not directly manage or control.…”
Section: Downloaded By [Ecole Hautes Etudes Commer-montreal] At 00:52mentioning
confidence: 99%
“…Their research focused uap ubp 3 4 5 6 7 8 2 9 10 11 12 13 14 1 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 3 4 5 6 7 8 2 9 10 11 12 13 14 1 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 3 4 5 6 7 8 2 9 10 11 12 13 14 1 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 They concluded that security and privacy issues need more attention while developing mobile phone sensing systems and applications, since as mobile phones are used for social interactions, users' private data are vulnerable. Harris et al [16] in their survey tried to identify all emerging security risks that mobile device imposes on SMEs and provided a set of minimum security recommendations that can be applied to mobile devices by the SMEs. Based on a fundamental dilemma, whether to move to the mobile era, which results in facing higher risks and investing on costly security technologies, or postpone the business mobility strategy in order to protect enterprise and customer data and information.…”
Section: Existing Surveys On Security For Smart Mobile Devicesmentioning
confidence: 99%