Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Business and Corporate Communications

Stephen F. Austin State University

Faculty Publications

2012

Security

Articles 1 - 1 of 1

Full-Text Articles in Business

Business Practices And Procedures Regarding Smartphone Security, S. Ann Wilson, Michael York, Courtney Short Jan 2012

Business Practices And Procedures Regarding Smartphone Security, S. Ann Wilson, Michael York, Courtney Short

Faculty Publications

Smartphones are having a transformational effect on the way that users access, use, and store information. Smartphones have essentially blurred the line of what is considered a phone, becoming the pinnacle multi-tasking devices of today’s world. Current smartphones have their own dedicated operating system, Bluetooth capabilities, GPS, WiFi, constant network connection, PC connectivity, and are internet enabled, leading them to have similar security risks as that of a computer. Businesses are now worrying about the information employees are storing on these devices and want to find new ways to protect it (Schiller, 2011). Smartphone capabilities used for business application will …