Mobile device security considerations for small- and medium-sized enterprise business mobility

Purpose – This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs. Design/methodology/approach – This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs. Findings – This paper identifies emerging mobile device secur...

[1]  I. Henri,et al.  ≪Give me a mobile phone, and I will work harder! ≫ Assessing the value of mobile technologies in organizations : an exploratory research , 2006, 2006 International Conference on Mobile Business.

[2]  Dimitris Gritzalis,et al.  Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..

[3]  Jerry Fjermestad,et al.  Privacy and Security in the Age of Electronic Customer Relationship Management , 2007, Int. J. Inf. Secur. Priv..

[4]  Steve Gold Cracking cellular networks via femtocells , 2011, Netw. Secur..

[5]  Steve Mansfield-Devine,et al.  Paranoid Android: just how insecure is the most popular mobile platform? , 2012, Netw. Secur..

[6]  David W. Johnson,et al.  Computer Security Risks in the Internet Era: Are Small Business Owners Aware and Proactive? , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).

[7]  Harold L. Koch,et al.  Are Home-Based Sales Representatives Aware and Proactive Regarding Security Risks in the Internet Era? , 2008 .

[8]  Steve Gold,et al.  Cracking wireless networks , 2011, Netw. Secur..

[9]  Katia Passerini,et al.  Information Technology for Small Business: Managing the Digital Enterprise , 2012 .

[10]  Steve Mansfield-Devine Security review: the past year , 2013 .

[11]  Steve Mansfield-Devine,et al.  Android architecture: attacking the weak points , 2012, Netw. Secur..

[12]  Diomidis Spinellis,et al.  Security requirements, risks and recommendations for small enterprise and home-office environments , 1999, Inf. Manag. Comput. Secur..

[13]  Roy Thurik,et al.  Erim Report Series Research in Management What's New about the New Economy? Sources of Growth in the Managed and Entrepreneurial Economies Bibliographic Data and Classifications , 2022 .

[14]  D. Bradbard,et al.  Computer Security in Small Business: An Empirical Study , 1990 .