The need for BYOD mobile device security awareness and training

Mark A. Harris, Karen Patten, Elizabeth Regan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Scopus citations

Abstract

In 2013, people will purchase 1.2 billion mobile devices, surpassing PC's as the most common method for accessing the Internet. The leading two mobile device platforms, Android and iOS, both have security concerns surrounding their operating systems and application markets. The popularity of Bring Your Own Device (BYOD), where employees use their own devices for both personal and work situations, potentially brings insecure devices into the organization. While most IT professionals agree mobile devices pose major security risks, there is a major lack of mobile device security awareness and training programs in organizations. This paper reports the results of a survey of 131 college students entering the workforce, which demonstrates a lack of security awareness and the need for mobile device security awareness and training in organizations. This paper also reviews the major security concerns with mobile devices and makes some general security recommendations.

Original languageEnglish (US)
Title of host publication19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World
Subtitle of host publicationAnything, Anywhere, Anytime
Pages3441-3451
Number of pages11
StatePublished - 2013
Externally publishedYes
Event19th Americas Conference on Information Systems, AMCIS 2013 - Chicago, IL, United States
Duration: Aug 15 2013Aug 17 2013

Publication series

Name19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime
Volume5

Other

Other19th Americas Conference on Information Systems, AMCIS 2013
Country/TerritoryUnited States
CityChicago, IL
Period8/15/138/17/13

Keywords

  • Android
  • BYOD
  • IOS
  • Mobile device security
  • Security awareness and training

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Library and Information Sciences

Fingerprint

Dive into the research topics of 'The need for BYOD mobile device security awareness and training'. Together they form a unique fingerprint.

Cite this