Smartphones are having a transformational effect on the way that users access, use, and store information. Smartphones have essentially blurred the line of what is considered a phone, becoming the pinnacle multi-tasking devices of today’s world. Current smartphones have their own dedicated operating system, Bluetooth capabilities, GPS, WiFi, constant network connection, PC connectivity, and are internet enabled, leading them to have similar security risks as that of a computer. Businesses are now worrying about the information employees are storing on these devices and want to find new ways to protect it (Schiller, 2011). Smartphone capabilities used for business application will be investigated for their potential vulnerabilities due to lack of employees’ precautions and smartphone usage.
Wilson, S. Ann; York, Michael; and Short, Courtney, "Business Practices and Procedures Regarding Smartphone Security" (2012). Faculty Publications. 42.
Tell us how this article helped you.
Originally published in the Proceedings of the Association of Business Information Systems, Federation of Business Disciplines, New Orleans, LA, March 2012. Posted with permission from the Association of Business Information Systems