2014
DOI: 10.19030/iber.v14i1.9072
|View full text |Cite
|
Sign up to set email alerts
|

Proposed Practices To Mitigate Significant Mobility Security Risks

Abstract: Enterprise mobility is emerging as a fast-growing trend worldwide. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations information. Information Technology (IT) governance frameworks can provide guidance in managing these risks at a strategic level, but these frameworks do not effectively govern on a technical operational level. Implementation of these frameworks may also be inefficient, as they are generic and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Different enterprise security approach patterns [24][25][26] describe steps of information security analyses. From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
See 4 more Smart Citations
“…Different enterprise security approach patterns [24][25][26] describe steps of information security analyses. From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
“…From the pattern of BSI [26] for the creation of a security concept, the authors derive a proposal (Fig. 1) to combine this analysis with a two-stage feasibility check for transformations of the mobile ERP system access.…”
Section: Security Analysis For Mobile Erp Access Transformationsmentioning
confidence: 99%
See 3 more Smart Citations