Open Access. Powered by Scholars. Published by Universities.®

Databases and Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Management Sciences and Quantitative Methods

Devices

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Databases and Information Systems

Assessing The Influence Of Smart Mobile Devices On How Employees Work, Adam L. Gorski Jan 2017

Assessing The Influence Of Smart Mobile Devices On How Employees Work, Adam L. Gorski

Walden Dissertations and Doctoral Studies

The smart mobile device market penetration reached 50% and has been increasing an average of 39% per year in the United States. More than 70% of the smart mobile device owners use such devices for personal and work activities. The problem was the lack of management's understanding of the effect smart mobile device use has on how employees work when they are in the office, while traveling, or during the off-hours to improve productivity and customer service. The purpose of this phenomenological study was to understand why, when, and how employees used smart mobile devices. The transformational technology conceptual framework …


Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton Jan 2014

Supporting And Securing Personal Mobile Devices Within An Existing Information Technology Environment, George Allen Patton

Walden Dissertations and Doctoral Studies

Personal mobile devices are becoming integrated into the daily operations of business. Managers are realizing that employees who are allowed to use personal mobile devices to access corporate information systems may reduce costs as users buy their own devices. The problem was that managers have a limited understanding of the need to secure or support personal mobile devices. The purpose of this survey study was to examine the relationship between employees' desire to use personal mobile devices and corporation needs for security and support. Hypotheses were tested by examining the relationships between the requirement to support and secure personal mobile …