The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the general current state
of published mobile device artifacts at higher education institutions. Results show
that such artifacts are only sparsely available through public university websites,
and even when available, rarely address mobile device security specifically.
Chin, Amita Goyal; McRae, Diania; Jones, Beth H.; and Harris, Mark A.
"An Exploration of Mobile Device Security Artifacts At Institutions Of Higher Education,"
Journal of International Technology and Information Management: Vol. 25
, Article 4.
Available at: http://scholarworks.lib.csusb.edu/jitim/vol25/iss3/4
Business Intelligence Commons, Communication Technology and New Media Commons, Computer and Systems Architecture Commons, Data Storage Systems Commons, Digital Communications and Networking Commons, E-Commerce Commons, Information Literacy Commons, Management Information Systems Commons, Management Sciences and Quantitative Methods Commons, Operational Research Commons, Science and Technology Studies Commons, Social Media Commons, Technology and Innovation Commons