•  
  •  
 

Journal of International Technology and Information Management

Document Type

Article

Abstract

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the general current state

of published mobile device artifacts at higher education institutions. Results show

that such artifacts are only sparsely available through public university websites,

and even when available, rarely address mobile device security specifically.

Share

COinS