Content area
Full Text
Introduction
Business mobility capabilities are becoming more critical to an enterprise's everyday business environment. Nokia defined "business mobility" as giving employees the "freedom to collaborate and transact business outside traditional workplaces and times. [Business mobility] is communications on the go, with access to the right information at the right time" ([40] Nokia White Paper, 2006, p. 2). Employees spend more time interacting with customers and vendors and less time at their desks. Instant communications cause customers to also expect immediate responses to any requests, which require real-time customer support services. Yet, even as enterprises integrate business mobility to leverage flexibility and productivity into their business strategy, they realize that they need new policies to address people, processes, and technology implications from the mobile way of doing business. Without new policies, enterprises find themselves overwhelmed with a mish-mash of various employee-owned mobile devices (referred to as "bring your own devices (BYOD)") and multi-vendor services. Also, as a result of the mish-mash, enterprise employees often lack systematic access to enterprise information, impeding their ability to collaborate with each other and their customers.
Mobile device technology is also changing rapidly. Mobile devices primarily include smartphones and tablets, but also include personal digital assistants (PDAs), gaming consoles, and e-readers. This paper will focus on the more popular mobile devices, smartphones and tablets. Information systems security specialists are more familiar with older technologies such as desktop computers and mobile laptops with the most-widely used Microsoft Windows operating systems. However, security experts have new concerns with the popularity of smartphones and tablets. These devices do not use the common Windows operating systems. Instead they use operating systems like Apple's iOS and Google's Android OS, which are much newer and less familiar. Smartphones and tablets also use different software applications than found on typical computers. This software is most often purchased through online stores controlled by the operating system's parent (i.e. Apple and Google). These new security concerns raise issues about the security and safety of enterprise's business, customer, and employee data and information. It also raises issues about an employee's own personal information when employee's use their personal devices for business.
Over the past ten years, innovative and technology-savvy small- and medium-sized enterprises (SMEs) provided their employees better broadband internet access...