Document Type
Article
Publication Date
2012
Abstract
Smartphones are having a transformational effect on the way that users access, use, and store information. Smartphones have essentially blurred the line of what is considered a phone, becoming the pinnacle multi-tasking devices of today’s world. Current smartphones have their own dedicated operating system, Bluetooth capabilities, GPS, WiFi, constant network connection, PC connectivity, and are internet enabled, leading them to have similar security risks as that of a computer. Businesses are now worrying about the information employees are storing on these devices and want to find new ways to protect it (Schiller, 2011). Smartphone capabilities used for business application will be investigated for their potential vulnerabilities due to lack of employees’ precautions and smartphone usage.
Repository Citation
Wilson, S. Ann; York, Michael; and Short, Courtney, "Business Practices and Procedures Regarding Smartphone Security" (2012). Faculty Publications. 42.
https://scholarworks.sfasu.edu/businesscom_facultypubs/42
Comments
Originally published in the Proceedings of the Association of Business Information Systems, Federation of Business Disciplines, New Orleans, LA, March 2012. Posted with permission from the Association of Business Information Systems