2013
DOI: 10.12959/issn.1855-0541.iiass-2013-no2-art03
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Devices and Effective Information Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…With that in mind, Markelj and Bernik's (2012) study discusses the use of mobile devices while dealing with questions relating to data security in enterprises which apply BYOD. The study points out the need to adopt clear and well defined information security policies, and presents current solutions and best practices and techniques in BYOD implementation as a way to mitigate risks and not compromise information security.…”
Section: It Consumerization In Companiesmentioning
confidence: 99%
“…With that in mind, Markelj and Bernik's (2012) study discusses the use of mobile devices while dealing with questions relating to data security in enterprises which apply BYOD. The study points out the need to adopt clear and well defined information security policies, and presents current solutions and best practices and techniques in BYOD implementation as a way to mitigate risks and not compromise information security.…”
Section: It Consumerization In Companiesmentioning
confidence: 99%
“…These devices are generally compact in nature, yet they have the ability to be used to perform tasks similar to most personal computers. It should come as no surprise that in a report prepared by IBM (2011) as well as research conducted by Markelj and Bernik (2012) that the most frequently seen mobile device security threats are the loss and the theft of these devices. The loss of a personal smartphone or tablet on which an employee has downloaded confidential data of the organisation creates an opportunity for a criminal to access the organisation's confidential information.…”
Section: Theft or Loss Of Mobile Devicesmentioning
confidence: 99%
“…Rose (2012) highlighted the security implications which arise as a result of BYOD. Markelj and Bernik (2012) indicated the threats that arise as a result of using mobile devices and the impact on corporate data security. Most of the research investigating the risks do so in an ad hoc manner, without relying on the available IT governance frameworks.…”
Section: Introduction and Research Objectivementioning
confidence: 99%
“…If a mobile device is connected to an institution's network as well as a public network, an unprotected path to the institution's central information system can potentially be opened, creating a security issue. A mobile device can become a gateway to an institution's private information [44], [16].…”
Section: E Challenges Hindering the Use Of Mobile Devicesmentioning
confidence: 99%