Proposed practices to mitigate significant mobility security risks
dc.contributor.author | Brand, Johanna Catherina | |
dc.contributor.author | Kruger-Van Renen, Wandi | |
dc.contributor.author | Rudman, Riaan | |
dc.contributor.other | School of Accounting | en_ZA |
dc.date.accessioned | 2015-07-23T13:49:39Z | |
dc.date.available | 2015-07-23T13:49:39Z | |
dc.date.issued | 2015-02 | |
dc.description | Publication of this article was funded by the Stellenbosch University Open Access Fund | |
dc.description | The original publication is available at http://www.cluteinstitute.com | |
dc.description | Please cite as follows: | |
dc.description | Brand, J. C., Kruger-Van Renen, W. & Rudman, R. 2015. Proposed practices to mitigate significant mobility security risks. International business & economics research journal, 14(1): 199-220. | |
dc.description.abstract | Enterprise mobility is emerging as a fast-growing trend worldwide. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Information Technology (IT) governance frameworks can provide guidance in managing these risks at a strategic level, but these frameworks do not effectively govern on a technical operational level. Implementation of these frameworks may also be inefficient, as they are generic and do not necessarily cover all the risks relating to a specific technology. This study provides organisations with guidance on how to govern these enterprise mobility security risks in an effective manner at both a strategic and an operational level. Using three IT governance frameworks, this study identified 12 practices that companies can employ to mitigate significant mobility security risks. | |
dc.description.uri | http://www.cluteinstitute.com | en_ZA |
dc.description.version | Enterprise mobility is emerging as a fast-growing trend worldwide. Numerous risks originate from using mobile devices for business-related tasks and most of these risks pose a significant security threat to organisations’ information. Information Technology (IT) governance frameworks can provide guidance in managing these risks at a strategic level, but these frameworks do not effectively govern on a technical operational level. Implementation of these frameworks may also be inefficient, as they are generic and do not necessarily cover all the risks relating to a specific technology. This study provides organisations with guidance on how to govern these enterprise mobility security risks in an effective manner at both a strategic and an operational level. Using three IT governance frameworks, this study identified 12 practices that companies can employ to mitigate significant mobility security risks. | en_ZA |
dc.description.version | Publishers' version | |
dc.identifier.citation | Brand, J. C., Kruger-Van Renen, W. & Rudman, R. 2015. Proposed practices to mitigate significant mobility security risks. International business & economics research journal, 14(1): 199-220. | en_ZA |
dc.identifier.issn | 2157-9393 (Online) | |
dc.identifier.issn | 1535-0754 (Print) | |
dc.identifier.uri | http://hdl.handle.net/10019.1/97250 | |
dc.publisher | Clute Institute | en_ZA |
dc.rights.holder | Author holds the copyright | |
dc.subject | COBIT | en_ZA |
dc.subject | ITIL | en_ZA |
dc.subject | ISO | en_ZA |
dc.subject | IT Governance | en_ZA |
dc.subject | Mobility Risks | en_ZA |
dc.title | Proposed practices to mitigate significant mobility security risks | en_ZA |
dc.type | Article | en_ZA |