Mobile and Connected Device Security Considerations: A Dilemma for Small and Medium Enterprise Business Mobility?
Mark A. HarrisKaren P. PattenElizabeth A. ReganJerry FjermestadPublished in: AMCIS (2012)
Keyphrases
- enterprise systems
- mobile computing environment
- enterprise architecture
- mobile computing
- business applications
- security management
- information systems
- mobile users
- service management
- mobile devices
- wearable devices
- business processes
- competitive advantage
- mobile computing devices
- mobile commerce
- knowledge management
- mobility patterns
- mobile networks
- portable devices
- information security
- business activities
- business process
- enterprise wide
- business environment
- ad hoc networking
- remote server
- mobile learning
- network security
- mobile terminals
- mobile phone
- electronic business
- security requirements
- rfid technology
- business models
- mobile agents
- business intelligence
- context aware
- activity monitoring
- business goals
- business management
- management information systems
- virtual enterprise
- wireless networks
- access control
- enterprise data
- cloud services
- network connectivity
- security issues
- rfid tags
- mobile applications
- hand held devices
- information management
- telecommunications industry
- electronic commerce
- virtual private network
- web services