Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility?

نویسندگان

  • Mark A. Harris
  • Karen P. Patten
  • Elizabeth A. Regan
  • Jerry Fjermestad
چکیده

Business mobility is rapidly becoming an everyday way of doing business. Mobile technologies, such as smartphones and connected devices, are enabling this business evolution. However, they are also creating new security concerns for the enterprise and its employees. Security experts are studying these increased security concerns to develop more secure practices and policies for the next generation mobile technologies. This paper describes these new mobile security concerns and discusses preliminary expert recommendations to reduce an increasing business risk. Although large enterprises have the resources to implement emerging security recommendations, small and medium enterprises (SMEs) may not be able to adopt the new recommendations because they lack IT resources and capabilities. This paper describes the SME dilemma: Embrace the mobility business strategy and adopt and invest in the necessary security technology, or give up their mobility business strategy to protect enterprise and customer data and information. Finally, the paper identifies future research questions concerning SME security awareness and capability to minimize security threats to develop more viable security practices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Model for E-Readiness Assessment of Iranian Small and Medium Enterprises

The current dynamic and turbulent business environment has forced companies that are competing in global markets to change their traditional methods of conducting business. Recent developments in applying Information Technology (IT) offer the most exciting business opportunities in the marketplace. Organizations must re-evaluate every aspect of their strategies and quickly move to a working mod...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

Issues, Solutions and Recommendations for Mobile Device Security

Security is a major concern for any mobile computing device such as Laptop, Notebook, Mobile Phone, Personal Digital Assistant (PDA), Smart phone etc. which contains sensitive data and accesses the Internet. Due to the inherent nature of these devices such as Mobility and Portability, they encounter additional security issues compare to the conventional computing devices. Now-a-days, business a...

متن کامل

Securely Adopting Mobile Technology Innovations for the Enterprise using IBM Security Solutions

Understand mobile computing business patterns and associated security risks Secure and monitor mobile device, data, enterprise access, and applications Realize mobile enterprise security strategy using IBM Security Solutions Redguides for Business Leaders

متن کامل

Mobile Device Security Issues within the U.s. Disadvantaged Business Enterprise Program

This paper reports on the results of a mobile device security awareness and practice survey of one special type of small business referred to as Disadvantaged Business Enterprises (DBEs) within the U.S. Department of Transportation. As government contractors, DBEs have access to government information systems. With recent cyber-attacks on large corporations through their less secure subsidiarie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012