Mobile technology risk management

dc.contributor.authorSahd, Lize-Marieen_ZA
dc.contributor.authorRudman, Riaanen_ZA
dc.date.accessioned2016-07-22T10:23:16Z
dc.date.available2016-07-22T10:23:16Z
dc.date.issued2016
dc.descriptionCITATION: Sahd, L.M. & Rudman, R. 2016. Mobile technology risk management. Journal of Applied Business Research, 32(4):1079-1096, doi:http://dx.doi.org/10.19030/jabr.v32i4.9723.en_ZA
dc.descriptionThe original publication is available at http://www.cluteinstitute.com/journals/journal-of-applied-business-research-jabr/en_ZA
dc.descriptionPublication of this article was funded by the Stellenbosch University Open Access Fund.en_ZA
dc.description.abstractMobile technology is fast becoming an indispensable part of consumers’ lives and an essential business tool in improving productivity, streamlining business processes and remaining competitive. The mobile revolution is transforming business operations, but the pervasive nature of mobile technology also introduces new and significant risks into all areas of the businesses. In most businesses, however, the governance of mobile technology and its related risks is often disjointed and implemented in an ad hoc manner, resulting in all risks not being addressed. This lack of appropriate governance policies and procedures is a direct consequence of a lack of understanding of the technology and the speed at which new technologies are developed and adopted. If the risks are not addressed in a comprehensive manner, it could have severe consequences for a business. The objective of this research is to address this problem by using an appropriate control framework, Control Objectives for Information Technology (COBIT), to identify a comprehensive set of internal controls to address mobile technology risks at a governance, management and operational level. The research proposes a comprehensive set of internal controls which can be used by those charged with governance to manage each significant risk arising from the implementation of mobile technology.en_ZA
dc.description.urihttp://www.cluteinstitute.com/ojs/index.php/JABR/article/view/9723
dc.description.versionPublisher's versionen_ZA
dc.format.extent18 pages
dc.identifier.citationSahd, L.M. & Rudman, R. 2016. Mobile technology risk management. Journal of Applied Business Research, 32(4):1079-1096, doi:http://dx.doi.org/10.19030/jabr.v32i4.9723en_ZA
dc.identifier.issn2157-8834 (online)
dc.identifier.issn0892-7626 (print)
dc.identifier.otherdoi:http://dx.doi.org/10.19030/jabr.v32i4.9723
dc.identifier.urihttp://hdl.handle.net/10019.1/99222
dc.language.isoen_ZAen_ZA
dc.publisherClute Instituteen_ZA
dc.rights.holderAuthors retain copyrighten_ZA
dc.subjectInformation technology -- Security measuresen_ZA
dc.subjectMobile communication systems -- Security measuresen_ZA
dc.subjectCell phone systems -- Security measuresen_ZA
dc.subjectMobile computing -- Security measuresen_ZA
dc.subjectRisk managementen_ZA
dc.subjectCOBIT (Information technology management standard)en_ZA
dc.titleMobile technology risk managementen_ZA
dc.typeArticleen_ZA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
sahd_mobile_2016.pdf
Size:
433.16 KB
Format:
Adobe Portable Document Format
Description:
Download article
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.95 KB
Format:
Item-specific license agreed upon to submission
Description: