Significant risks relating relating to mobile technology
dc.contributor.author | Sahd, Lize-Marie | en_ZA |
dc.date.accessioned | 2018-01-18T09:48:56Z | |
dc.date.available | 2018-01-18T09:48:56Z | |
dc.date.issued | 2016 | |
dc.description | CITATION: Sahd, L.-M. 2016. Significant risks relating relating to mobile technology. Journal of Economic and Financial Sciences, 9(1):291-309. | |
dc.description | The original publication is available at https://jefjournal.org.za | |
dc.description.abstract | The consumerisation of mobile technology is driving the large-scale adoption of mobile solutions in business models. Each component of mobile technology, however, introduces specific risks into the enterprise and those charged with governance are often unaware of all the risks they are exposed to. The research addresses this problem by using the processes of Control Objectives for Information and Related Technology (COBIT) to identify the significant risks introduced by mobile technology and linking these risks to the components of the technology. The resulting risk matrix determines an enterprise’s risk exposure given its mobile technology component landscape and identifies the most effective technology to deploy given the enterprise risk tolerance levels. The matrix also promotes improved alignment through the development of IT governance systems that correlate with business strategies and by using the understanding of IT capabilities to drive business strategies. | en_ZA |
dc.description.uri | https://jefjournal.org.za/index.php/jef/article/view/43 | |
dc.description.version | Publisher's version | |
dc.format.extent | 19 pages | |
dc.identifier.citation | Sahd, L.-M. 2016. Significant risks relating relating to mobile technology. Journal of Economic and Financial Sciences, 9(1):291-309. | |
dc.identifier.issn | 2312-2803 (online) | |
dc.identifier.issn | 1995-7076 (print) | |
dc.identifier.uri | http://hdl.handle.net/10019.1/103046 | |
dc.language.iso | en_ZA | en_ZA |
dc.publisher | AOSIS Publishing | |
dc.rights.holder | Author retains copyright | |
dc.subject | Mobile technology | en_ZA |
dc.subject | Mobile communication systems | en_ZA |
dc.subject | Business enterprises -- Computer networks -- Security measures | en_ZA |
dc.subject | Mobile computing -- Security measures | en_ZA |
dc.subject | Computer security | en_ZA |
dc.subject | Mobile computing -- Risk management | en_ZA |
dc.subject | Cell phone systems -- Security measures | en_ZA |
dc.subject | COBIT (Information technology management standard) | en_ZA |
dc.subject | Risk management | en_ZA |
dc.title | Significant risks relating relating to mobile technology | en_ZA |
dc.type | Article | en_ZA |