SlideShare a Scribd company logo
1 of 45
Accounting and Management Information Systems
Vol. 18, No. 1, pp. 101-118, 2019
DOI: http://dx.doi.org/10.24818/jamis.2019.01005
Facing the mobile revolution: A Romanian
insight
Victoria Stanciua1 and Mirela Gheorghea
a The Bucharest University of Economic Studies, Romania
Abstract
Research question: Are the accounting graduates prepared to
deal with mobile
devices’ security issues? Motivation: Nowadays, mobile
computing is a part of the
younger generation, the entering workforce in coming years,
and from this point of
view the BYOD (Bring Your Own Device) approach will
continue its increasing
trend. The authors investigated the accounting bachelors’
knowledge in regard with
mobile devices’ use aiming at signaling the existing gap on
mobile devices’
security awareness. IT security specialists consider that both,
academia and
industry should focus their security awareness campaigns
aiming at combat the
false sense of security that mobile devices’ users have. Idea:
The authors aimed at
providing an in-depth understanding of the accounting students’
profile as mobile
devices’ users and their knowledge and awareness in regard
with mobile security
threats. Data: The analyzed sample includes 180 subjects, out of
which 81% are
bachelors in accounting (38% 1st year; 43% 3rd year) and 19%
master students in
accounting and banking. Tools: The literature review helped us
in structuring our
research objectives and design a multiple-choice questionnaire
used in the
empirical study. Findings: The study reflects the students’
insufficient information
in regard with mobile devices features and security issues. This
is the result of the
limited IT lectures and seminars in the curriculum and the
insufficient focus on
mobile devices’ use in the accounting profession. Students
should understand the
mobile devices as complex devices providing diverse features,
not limited to
communication with friends and Internet information searching.
Contribution: The
study contributes towards closing the existing gap in the
Romanian research and
literature in regard with young generation insufficient
knowledge on mobile
devices’ security and the potential threat brought by BYOD on
the companies’ IT
environment.
1 Corresponding author: Department of Management
Information Systems, The Bucharest
University of Economic Studies; 6 Piata Romana, Bucharest;
tel. (+40) 0213191901;
email address: [email protected]
Facing the mobile revolution: A Romanian insight
102 Vol. 18, No. 1
Keywords: Mobile devices, threat, mobile security, BYOD
JEL Codes: A2, I25, M15
1. Introduction
Gadgets such smartphones and tablets brought a new lifestyle
across generations.
“Mobile devices are paying a larger role, not only in business
but social media”
and people’s personal life (Grant Thornton, 2013). The Y
generation is the one that
embraces natively the mobile devices’ use and this new
lifestyle. On the other
hand, companies are looking for business increase, higher
efficiency, more
visibility in the virtual space and improved relationship with
clients and partners.
The solution stays in mobile devices that bring lots of
advantages together with
business transformation and the new cultural challenge of
mobile culture,
altogether reshaping the business processes and rules. But let’s
look at the second
facet of the coin: mobile devices’ use is accompanied by a
diverse and concerning
set of security risks. The companies are aware that it is a high
likelihood that
sensitive information or data will be sent or received via mobile
devices (Grant
Thornton, 2013). “Securing organizational data and protecting
personally
identifiable information is not possible unless mobile devices
are secured” (Gearns,
2016: 36). In this new complex IT environment, the companies
face the security
risks from a new perspective. This risk approach emphasizes the
need for a threat
intelligent program and imposes integrated solutions, protecting
the companies’
network, applications and the diverse mobile devices’
infrastructure.
The companies understood that they have to align their
operating model to the
digital world, to manage their complex and continuo usly
evolving IT environment
embedding in it all the new gadgets that are now part of
employees’ lifestyle.
Specialists consider that companies demonstrating lack of
“confidence in their
ability to implement emerging technologies should see this as a
concern” (Kluver,
2013: 10). Nowadays, the mobile culture is deepened rooted in
the companies’
business processes. Companies worldwide are now opened to
the mobile devices
usage, being aware of mobile computing advantages. The BYOD
(Bring Your Own
Device) wave overflows the companies’ IT environment. A
survey performed in
2014 emphasized that 63% of the respondents declared that their
employees are
using, on daily bases, smartphones and tablets, 46% declared
that the employees
are using just smartphones and 29% of the employees are using
tablets. The same
survey revealed that 90% of the respondents allow in their
companies some mix of
personal and business own mobile devices (ISMG, 2015). As a
result, we can
conclude that BYOD concept has already reshaped the way
employees perform the
job requirements and the companies’ culture. It shouldn’t be
forgotten that “mobile
Accounting and Management Information Systems
Vol. 18, No. 1 103
computing is a part of the younger generation entering in the
workforce in coming
years” (Madan et al., 2013:4) and from this point of view the
BYOD will continue
its increasing trend. Even if the young generation is so opened
to the mobile
devices’ use it is observed a lack of mobile security knowledge
reflected in the
users’ behavior and security practices. A survey issued in 2014
emphasized the IT
security specialists’ opinion that “employees behavior is a
significant factor for
information security” (Dimensional Research, 2014: 2).
IT security specialists consider that since the mobile users “do
not actively follow
most of the security best practice, academia and industry should
focus their
security awareness campaigns and efforts in order to combat the
false sense of
security that users have” (Androulidakis, 2016:9). The authors
totally agree with
the above mentioned opinion and conducted their research on
the young generation
use of mobile devices aiming at emphasize their mobile users’
profile and security
knowledge. The research investigated the students’ mobile
devices’ security
awareness and personal practice behavior, the gaps in the
students’ training on the
topic and the universities’ role in preparing the young
generation of accountants to
face the mobile devices’ culture and security challenges. The
research revealed
significant gaps regarding the mobile security knowledge and
awareness in the
context of an extended use of mobile devices by accounting
students. The
complexity of the software, complicated settings and difficulties
in performing
updates are the causes for no security measures’ use declared by
the respondents.
The authors consider that bachelor students need more
theoretical training and
specific mobile devices’ security skills. There is still room for
more focus, in the
computing classes, on detailed approaches in regard with
accounting automated
processing flows and their security issues.
The present study is part of a wider research started two years
ago focusing on the
mobile computing impact of the accounting profession and the
accounting
students’ options for mobile devices use. The present study
contributes towards
closing the existing gap in the Romanian research and literature
in regard with
young generation insufficient knowledge on mobile devices’
security and the
potential threat brought by BYOD on the companies’ IT
environment.
The paper is structured as follows: the following section,
Section 2, reports on the
literature review on mobile devices’ increased use and mobile
devices’ specific
security issues. Section 3, discusses the research methodology,
objectives and
methods. Section 4 retains the main findings and conclusions of
the empirical
study. The research conclusions are synthetized in the final
section, Section 5,
emphasizing the insufficient knowledge of the mobile devices’
users on security
threats affecting the companies’ information security in the
context of the BYOD
trend.
Facing the mobile revolution: A Romanian insight
104 Vol. 18, No. 1
2. Literature insights on mobile device use and security
Global sales of smartphones registered, according Gartner’s
analysis, an important
increase in the first quarter of 2017, 9.1% comparing with the
Q1 of 2016, meaning
380 million units. The operating systems for those worldwide
sales reflect the
domination of Android OS (86.1%) and iOS, 13.7% (Gartner,
2017). This market
share consolidates the previous years of dominance of Android
and iOS. Taking
into consideration the market share, it is not surprising that IT
specialists view
these mobile platforms as the greatest risks for their companies
(Dimensional
research, 2014). The cybercriminals will always focus on most
numerous targets
presenting same week points. The sales increase reveals the
users’ preference for
the above mentioned mobile platforms and users’ trend of
spending more to get a
better smartphone.
The number of global tablet users registers a continuous
increase from 840 million
in 2014 at 1.32 billion in 2017 being expected 1.46 billion users
in 2020 (Statista,
2017). The global tablets’ market registered ups and downs, the
increase being less
dynamic during the years, Apple and Samsung continuing their
domination.
ISACA specialists consider that mobile computing devices’
vulnerabilities exist in:
the device itself, the wireless connection, the user’s personal
practices, the
organization’s infrastructure and wireless peripherals (e.g.
printers, keyboard,
mouse etc.).
NIST emphasizes seven aspects that define a model for all
threats of mobile device
(NIST, 2013):
1. Lack of physical security controls: compared to other
devices, the mobility
of smartphones and tablets exposes them at the risk of being
stolen or lost, fact
that affects data confidentiality. This statement is confirmed by
all the
international surveys analyzed by the authors, surveys that
indicate stolen and
lost mobile devices as one of the most significant treat in regard
with mobile
devices.
2. Use of untrusted mobile devices: in the current way of
manufacturing the
mobile devices and also in the OSs there are not implemented
suitable security
restrictions comparing to those available on a PC or laptop this
being
explained by the mobile devices initial usage destination.
3. Use of Untrusted Networks: the mobile devices can use non-
organizational
network for Internet connection. The data communication is
based on
technology such as Wi-Fi or cellular networks. Wireless
capability poses a
number of specific security risks.
4. Use of Untrusted Applications: the facility of searching and
installing apps
specifically designed for those devices (games, WhatsApp,
Snapchat etc.) is a
Accounting and Management Information Systems
Vol. 18, No. 1 105
characteristic that provides a high level of satisfaction to the
users but poses
obvious security risks.
5. Interaction with Other Systems: mobile devices may interact
with other
systems in terms of data exchange and storage and, as a result,
this interaction
raises important security issues.
6. Use of Untrusted Content.
7. Use of Location Services: mobile devices with GPS
capabilities typically run
as location services.
The critical question in regard with mobile use is why these
devices raise
significant security issues? It should be mention that mobile
devices began as a
consumer technology, and as a result, “many of these devices
lack the security and
administrative functions that IT and security teams use to
manage traditional
endpoints such as laptops and desktops” (McEnaney, 2016).
Nowadays, cyber
criminals focus a significant part of their attacks on mobile
devices, being aware of
the existing security weak points. Security specialists and more
informed users
understood that no one is immune to cyber-attacks and day by
day it is more
difficult to secure mobile devices. But it is a large segment of
mobile devices’
users being not informed or insufficient informed in regard with
mobile devices’
communications and apps issues this fact being reflected in
their behavior.
“Excessive confidence could lead to “relaxation” of security
practices while
excessive fear certainly hinders technology adoption and
especially mobile
downloading” (Androulidakis, 2016: 9). As a conclusion,
aiming at benefit from
the mobile devices advantages there is a stringent need to
inform the mobile users
in regard with the important mobile security issues and make
them aware with the
existing threats. Improving the mobile users’ behavior as a
result of their increased
security awareness will be beneficial for the individuals as well
as the companies
that adopted BYOD.
As it is already mentioned, compared to personal computers,
mobile devices
(including smartphones and tablets) are threatened by a larger
variety of factors
determined by technical characteristics such as: data
communication via Wi-Fi or
other Internet connections, video camera, microphone, data
storage systems, GPS
connectivity etc. ISACA specialists believe that the most
common risk factors that
apply to using mobile devices are: device-specific malware;
theft of sensitive data;
exposure of critical information through wireless sniffers;
wireless intruders
capturing emails, email addresses and attached data; loss, theft
or damage of the
device (ISACA, 2016).
The first virus, a Trojan, affecting Palm devices was identified
in 2000. Cabir, “the
first malicious code that can spread itself exploiting the
network technologies on
mobile devices” (Bluetooth) to infect other device was
identified in 2004 (La Polla
Facing the mobile revolution: A Romanian insight
106 Vol. 18, No. 1
et al., 2013: 449). Not long ago, two malware, Gooligan and
HummingBad,
affected millions of phones. Gooligan has taken hold of about
10 million Android
phones. The Google accounts were breached being obtained
personal and sensitive
data (Hautala, 2016; Check Point Research Team, 2016). Two
families of mobile
banking Trojans, Faketoken and Marcher, were created to steal
payment details
from Android devices. In the Facktoken case it should be
mentioned the
resourcefulness of the attack: when the user visits its online
banking account, the
Trojan modifies the page and asks the user to download an
Android application to
secure the transaction. As a result, the cybercriminal gains
access to the user’s
banking account (Kaspersky, 2015). These are some examples
of cyber-attacks on
mobile phones demonstrating the virulence and increasing
sophistication of the
mobile attacks methods. The continuous growing of mobile
malware is expecting
to continue due to the widespread of mobile devices. The 2017
survey of
Dimensional Research signals that malware (58% of the
respondents) and phishing
using text messages (54% of the respondents) were the most
frequent types of
attacks on mobile phones registered by the companies. In 2015,
in Romania, the
mobiles using Android OS experienced ransomware attacks; the
source of attacks
was represented by spam e-mail having as attachments infected
files or archives.
The 2017 PWC survey emphasized that 28% of the respondents
“reported security
compromises of mobile devices, and securing smartphones and
tablets is clearly
top of mind” for the IT security specialists (PWC, 2017: 9). The
IT security
professionals fight against mobile devices’ attacks issued by
cybercriminals is
extremely difficult. They deal with many products, from
multiple vendors,
determining significant costs to configure and manage all these
mobile devices and
having insufficient budgets so that many companies do not use
advanced mobile
cyber-attack protection solutions (Dimensional Research, 2017).
In this context, it is obvious that security professionals consider
as the top three
inhibitors for the full deployment of mobile workforce: privacy,
device security
and content security (Information Security Media Group, 2015).
The mobile devices’ security must be accompanied by a secure
mobile
communication. Aiming at ensuring confidentiality and data
integrity the security
specialists should identify the most adequate security
mechanisms (as for example
mobile token or a link-layer) and promote authentication so that
the receiver to
trust the source of the message.
Mobile devices’ security implies a set of controls as for
example (ISMG, 2015;
PWC, 2017):
- Devices’ management (enforcing passcodes, malware
prevention etc.);
Accounting and Management Information Systems
Vol. 18, No. 1 107
- Controlling users’ login time, patterns of access and type of
device;
- Applications’ security, implying vulnerabilities testing and
permanent updates;
- Enterprise data encryption;
- Screen locks;
- A risk based mobile access decision in regard with the
companies’ resources;
- Transactions’ security (end-to-end encryption, transaction risk
scoring etc.);
- Restricted sharing of the company content with non-company
approved
applications etc.
A centralized and coherent BYOD policy is for now compulsory
for any company.
Adopting this policy is not an easy task, IT professionals having
to take into
consideration and balance several factors:
- the need to understand the company’s mobile computing
pattern and the entire
set of potential security risks induced by the mobile devices’
use;
- it is difficult to decide how to drown the line on enforcing
security and usage
policy as long as the device is not own by the company;
- the personal and company’s data and applications are on the
same devices;
- the policy should be articulated with the entire set of IT
policies and reflect the
integrated information security defined for the company;
- there is a new paradigm that impacts the company’s culture
and employees’
behavior that should reflect an increased awareness on mobile
threats.
The companies are aware that they should integrate the new
technologies in their
digital ecosystem this being a very demanding and challenging
objective. There is
an increasing dynamic of the innovation in the IT industry and
the companies
should be prepared to understand and assimilate all these
technological changes
integrating them in the business and management models. The
effort continues on
the IT maintenance layer and monitor of the mobile device.
Facing so diverse and challenging information security threats,
IT specialists
became aware of the need to have a threat intelligent program.
Starting from the security professionals’ conclusion that
employees are a great
threat to security, greater than cybercriminals and their behavior
could make the
“difference in preventing high-profile security breaches”
(Dimensional Research,
2014) the authors investigated The Bucharest University of
Economic Studies’
students’ knowledge and awareness on mobile security issues.
The study’s results
are synthetized in the section 4.
Facing the mobile revolution: A Romanian insight
108 Vol. 18, No. 1
3. Methodology
The authors’ research had two coordinates: a qualitative one
aiming to identify the
security issues, characteristics and trends in mobile devices’ use
and, a second one,
aiming at performing and empirical study in regard with the
accounting students’
use of mobile devices and their knowledge and practices in
regard with mobile
devices’ security.
The authors performed a systematic literature review on mobile
devices’ use and
security. The literature review helped us in structuring our
research objectives and
design the questionnaire used in the empirical study. The
authors focused on
researches performed worldwide in regard with the mobile
devices’ use in business
processes and specific issues raised in the IT risk management,
synthetizing the
main problems emphasized by the researches and analysing the
surveys issued by
prestigious international organizations.
The empirical study is based on a survey aiming to reveal the
users’ practices and
awareness in regard with mobile devices. The students in The
Bucharest University
of Economic Studies (the last year of bachelor degree and
master students)
represent the target group. The criteria used to establish the
target group are [i] the
students’ age – the Y generation is more receptive to new
technologies and [ii] the
graduate students are the new entries in the accounting
profession and, from this
point of view, it is revealing for the study to investigate their
mobile devices’
practices and security awareness.
In the study was used a multiple-choice questionnaire
containing 21 questions
structured in two parts: in the first part were included
demographic questions
aiming to retain the students’ gender, field and level of study.
The second part
included questions focusing on the nature, characteristics,
practices and security
perception of the users’ in regard with mobile devices.
We collected 180 questionnaires, none of them being rejected.
The respondents’
sample is representative for the analyzed population. The
subjects are accounting
bachelors and students from accounting and finance and banking
master programs.
The data collection was performed between October 2017 and
January 2018. The
present survey extends the previous one performed during
October 2016 and
December 2017 aiming at enlarging our research on the mobile
devices’ use and
security impact in the accounting profession and consolidates
the previous research
conclusions.
Accounting and Management Information Systems
Vol. 18, No. 1 109
4. Results and discussion
The authors conducted the data analysis starting from the
following questions:
1. Which is the students’ behaviour as mobile devices’ users?
2. What are the aspects influencing the students in mobile
device purchase?
3. Which is the students’ perception on the education/training in
mobile security
field?
4. Which are the security measures implemented by the students
on their mobile
devices?
5. Which are the reasons of not using security measures?
6. Which are the security incidents experienced by the students
in the past 2
years?
The structure of the analyzed sample includes: 180 subjects, out
of which 81% are
bachelor’s in accounting (38% 1st year; 43% 3rd year) and 19%
master students in
accounting and banking. From the entire sample 14%
respondents are males and
86% females.
The study reveals that all the students questioned use at least
one mobile device
and among them a major part owns a smartphone (99%) and a
laptop (86%).
Table 1. Types of mobile devices used by students
Type Frequency
Smartphone 99%
Laptop 86%
Tablet 28%
MP3 Player 6%
Cell phone 1%
Within the questionnaire a number of questions tried to
investigate the students’
views upon the mobile devices technical features. In this regard,
one of the
questions analyzed the elements that can influence the buyer (on
a scale of 1 to 7)
while choosing a device. The results highlighted that the most
important factor is
the producer, followed by the price and the operating system.
The last places were
occupied by the connectivity and the service systems.
Facing the mobile revolution: A Romanian insight
110 Vol. 18, No. 1
Figure 2. Factors influencing the decision to acquire a mobile
device
The authors proceeded to another analysis aiming at create a
scale for the technical
features of the mobile devices. The analysis emphasizes that
battery autonomy,
operating system, storage capacity and RAM size are the main
preferences of the
students. Last places are taken by interoperability, screen size,
keyboard and
weight. The security is somewhere in between, fact that
represents a healthy
reasoning that proves a certain awareness.
Figure 3. Technical features priorities
The following questions focused on the security of the mobile
devices. On this
purpose, we asked the subjects: How important is the security
for them? At which
level do they estimate their mobile devices’ security? How did
their behaviour
evolve towards information security in the past year? The
students’ answers reveal
interest for the topic in discussion, 63% consider that they
implemented good
security solutions, 26% are not sure and 11% think they are not
using enough
Accounting and Management Information Systems
Vol. 18, No. 1 111
security measures. The great majority of the respondents
consider they are more
aware on security need then in the previous years. This is in
line with the
respondents’ opinion in our 2017 survey. Other issues refer to
the level of
education/training in information security field. We can observe
that a great
majority (40%) learned about this subject online, 20% from the
university lectures
and 11% claimed that nobody taught them.
Figure 4. Where did you learn about information security?
The subjects’ point of view regarding information security
education is that every
person should receive this sort of information (132 students) or
search about it on
their own (60 students). Again, as the 2017 survey revealed, the
mobile security
information is collected individually, the Internet being the
main source. The
academic curricula did not significantly improve the students’
knowledge and
behaviour in regard with mobile devices’ security. There is still
room for security
training in the university’s curriculum.
Table 2 The respondents’ point of view in regard with
information security
education
Assertions about education Frequency
Everyone should receive information on information security
49%
Employees of companies need to have knowledge of information
security
14%
Information security must be taught in schools 12%
Everyone should be documented about the security of
information 22%
Education in the field is not required if the security software is
used 1%
Education in the field is only needed by IT specialists 2%
Facing the mobile revolution: A Romanian insight
112 Vol. 18, No. 1
Regarding the measures of security used by the subjects and
also the reasons why
they wouldn’t use them we obtained the following results: 69%
claim that they are
using anti-virus software, 12% firewall, 8% software anti-spam
and only 6% are
not using any security methods.
Figure 5. Security measures implemented on the
computer/telephone
Considering the data and information security coverage the
respondents indicated
as the most used protection measures - backup files (52%),
periodically change of
the passwords (30%) and encryption of important files (12%).
The respondents’
answers focus more on laptops than smartphones that reflecting
the connection
they make between laptops (computers) and IT threats being
less aware on mobile
security issues. The students’ answers did not indicate specific
smartphones’
security measures.
Figure 6. Security measures to protect data
Accounting and Management Information Systems
Vol. 18, No. 1 113
The respondents indicated their reasons for not using security
measures: 33%
believe that setting the security system is too complicated, 32%
consider that the
updates and backups imply complex software knowledge, 22%
think it’s too
expensive, 13% don’t feel the need. Even if we expected the
costs to be reported as
the top obstacle it can be seen that the situation is quite
alarming, the respondents’
answers indicated insufficient knowledge and skills.
Table 3 Why did you not use security measures?
Reasons for security measures
No. of
respondents
%
It costs money 40 22%
Their setting is complex 60 33%
Update, back-up settings involve complex software 57 32%
I do not feel the need for security measures 23 13%
The students’ opinion is that the most important disadvantages
of the security
measures are: the need of special technical installation
knowledge (37%) and the
cost (36%).
Figure 7. Disadvantages of security measures
…
computerweekly.com 15-21 May 2018 24
When budgets are tight, as they are for most small and medium-
sized enterprises (SMEs), having a mobile strategy may seem an
extravagance. However, most businesses use mobile devices in
one way or another, so maximising their usefulness is a must.
According to the Office for National Statistics (ONS), the num-
ber of people who regularly work from home has risen to 4.2
mil-
lion in the past decade and it is expected that half of the UK’s
workforce will be working remotely by 2020. Also, the latest
figures from the Department for Business, Energy and Industrial
Strategy (BEIS) show that 16.1 million people work for SMEs –
60% of all private sector employment in the UK.
Myles Leach, managing director at voice-over-IP (VoIP) firm
Nfon UK, says it stands to reason that SMEs are, and will con-
tinue to be, affected by this change in working trends.
“Employees
need and want to have the opportunity to work flexibly,” he
says.
“But crucially, it benefits the SME. It saves on office space and
costs. Operations can continue when a site is shut because of
bad
weather or maintenance. There will be fewer staff sick days as
they can still work in school holidays and when children are
ill.”
Bringing moBile into smes
What works for one SME may not work for another, but before
adopting a mobility strategy, it is important to look at what is
already in place to see where changes are needed. According to
Andres Richter, CEO at cloud ERP (enterprise resource
planning)
specialist Priority Software, when his firm carried out a survey
of 500 UK senior decision-makers, more than one-third did not
Find the right mobility
strategy For your sme
Small companies need a strategy to make the most of staff
mobility,
so what should business owners look out for? Rene Millman
reports
MOBILE TECHNOLOGY
JESUSSANZ/GETTY
Home
http://www.computerweekly.com
https://www.computerweekly.com/indepth/IT-for-small-and-
medium-sized-enterprises-SME
https://www.computerweekly.com/resources/Smartphone-
technology
http://smallbusiness.co.uk/half-uk-workforce-remotely-2020-
2540827/
https://www.gov.uk/government/statistics/business-population-
estimates-2017
https://searchunifiedcommunications.techtarget.com/answer/Ho
w-do-you-configure-VoIP-on-a-network
https://searcherp.techtarget.com/definition/cloud-ERP
https://www.techtarget.com/contributor/Rene-Millman
computerweekly.com 15-21 May 2018 25
Home
News
As Brexit gets
ever closer, is the
UK government
technologically ready?
Better understanding
needed to get cyber
security products to
market, says NCSC
Wagamama uses its
noodle to satisfy diners
Editor’s comment
Buyer’s guide
to big data
Serverless computing:
What it is and
why it matters
Find the right mobility
strategy for your SME
Downtime
have the correct technology to support mobile
working, and 43% could not perform business-
critical functions on a mobile application.
“If the company already has business software
applications in place, it should see if its vendors
already offer mobility tools,” says Richter. “For
example, many modern ERP systems now support
mobile application generators, which allow users
to create a range of applications from their mobiles and use
them
to perform core business processes no matter where they are.
These can be created in a matter of minutes, and don’t require
high levels of IT expertise – perfect for SMEs looking to
enhance
their mobility strategy using existing technology.”
Jon Wrennall, CTO at cloud software supplier Advanced, says
SMEs should put employees at the heart of their mobile
strategy,
“empowering them to use mobile technology to streamline their
tasks and minimise the chances of departments working in
silos”.
cloud is a key driver
Wrennall says SMEs can use the cloud to help facilitate mobile
working, enabling users to work on the move and still have all
the real-time information they need at their fingertips.
“The cloud is a key driver in making mobile strategies success -
ful, but implementing such a strategy is often seen as a bold
move
as some SMEs lack confidence in adoption and don’t understand
the positive role it can play,” he adds.
“SMEs should look to take incremental steps. For example,
they can trial mobile technology with a select set of employees,
who can share feedback with those that are not
yet familiar with it. It also enables SMEs to assess
areas for improvement.”
Wrennall says that when it comes to devices and
service choice, not everyone is familiar with mobile
technology. Some will be more receptive to new
working practices, while others may not. “SMEs
should give more support to those that need it and
educate them on the benefits of mobile and cloud,” he says.
“They
should work closely with staff to find out their pain points. This
will
determine what devices and services they choose to implement.”
due diligence
Wrennall says a move to a mobile strategy should be consid-
ered with the same level of due diligence as any other signifi -
cant investment within a business. Before choosing what device
or service to adopt, SMEs must consider how a transition will
affect their staff and customers, and choose a provider that can
illustrate a clear and structured pathway for moving staff and
data to mobile technology as smoothly as possible.
“Device and service providers must be able to show they are
going to be a long-term value-adding partner and that they are
in
it for the long haul,” says Wrennall.
Organisations would be well advised to use just one type of
device or at least minimise the number of unique hardware/soft-
ware configurations, says Jack Zubarev, president at Parallels, a
supplier of desktop and application virtualisation software.
“The
cost of delivering and supporting applications simply increases
MOBILE TECHNOLOGY
❯ Food retailer Co-op plans
to introduce a smartphone
self-checkout system so that
customers can pay for goods
without visiting a till.
http://www.computerweekly.com
https://searcherp.techtarget.com/feature/Why-ERP-mobility-
requires-enterprises-to-be-proactive
https://www.oneadvanced.com/news-and-opinion/cloud-will-
only-reach-tipping-point-if-smes-become-confident-adopters/
https://www.brianmadden.com/opinion/VMware-and-Parallels-
both-announced-new-versions-of-their-client-hypervisors-
yesterday
https://www.computerweekly.com/news/252436317/Co-op-
trials-pay-in-aisle-technology
https://www.computerweekly.com/news/252436317/Co-op-
trials-pay-in-aisle-technology
https://www.computerweekly.com/news/252436317/Co-op-
trials-pay-in-aisle-technology
https://www.computerweekly.com/news/252436317/Co-op-
trials-pay-in-aisle-technology
https://www.computerweekly.com/news/252436317/Co-op-
trials-pay-in-aisle-technology
computerweekly.com 15-21 May 2018 26
Home
News
As Brexit gets
ever closer, is the
UK government
technologically ready?
Better understanding
needed to get cyber
security products to
market, says NCSC
Wagamama uses its
noodle to satisfy diners
Editor’s comment
Buyer’s guide
to big data
Serverless computing:
What it is and
why it matters
Find the right mobility
strategy for your SME
Downtime
with each unique device/software combination,” he adds.
“Further
device replacement and refresh will become far less expensive
if
one can standardise not just on device vendors, but on the spe-
cific configurations.
“But then again, most organisations do not have the luxury of
this standardisation as employees bring their own devices. In
this
case, universal remote delivery of applications to any device is
likely to provide the most cost-effective solution and isolate
soft-
ware delivery from underlying device hardware.”
making moBility secure
SMEs are in as much danger from cyber criminals as larger
enter-
prises. David Emm, principal security researcher at Kaspersky
Lab, says that if SMEs overlook mobile security, they risk
leaving
a big gap in their security defences. He says his firm detected
5,730,916 malicious installation packages, 94,368 mobile bank-
ing Trojans and 544,107 mobile ransomware Trojans in 2017.
“One of the dangers is that mobile technology ‘creeps’ into the
business and isn’t necessarily considered in the same way as
desktop or laptop security,” he says. “Consider the BYOD
[bring
your own device] trend, for example, where staff use their own
devices for business,” he says.
“This isn’t a bad thing per se, but businesses must include
mobile in their risk assessment, just as they would for any other
technology – look at what assets they have, how they are used,
how data is stored/moved, who has access to it, who might want
it, and how they might try to access it. In this sense, mobile
secu-
rity should be considered as part of an overall security
strategy.”
MOBILE TECHNOLOGY
JESUSSANZ/GETTY
http://www.computerweekly.com
https://www.computerweekly.com/feature/Getting-a-handle-on-
mobile-security-in-your-enterprise
https://www.computerweekly.com/feature/Getting-a-handle-on-
mobile-security-in-your-enterprise
https://www.computerweekly.com/news/252435696/2018-could-
be-year-of-mobile-malware-says-McAfee
https://www.brianmadden.com/opinion/Will-digital-assistants-
be-a-security-nightmare-like-BYOD
computerweekly.com 15-21 May 2018 27
Home
News
As Brexit gets
ever closer, is the
UK government
technologically ready?
Better understanding
needed to get cyber
security products to
market, says NCSC
Wagamama uses its
noodle to satisfy diners
Editor’s comment
Buyer’s guide
to big data
Serverless computing:
What it is and
why it matters
Find the right mobility
strategy for your SME
Downtime
One of the biggest trends affecting mobile strategy and secu-
rity is BYOD. “No longer can organisations insist on a device
to be used by staff,” says Clive Longbottom, service director at
Quocirca. “This is made worse by the changes in workforce –
con-
tractors, consultants, specialists and so on cannot be forced to
use a specific device, but can be forced to allow the
organisation
to create a secure partition on their device.”
Employees at smaller firms may not realise, when download-
ing an app, where that app came from. “Employees can search
an
app store and find any number of apps
that purport to be able to do what they
want,” says Longbottom. “Individuals
tend not to even check where the
developer comes from – maybe Russia
or China – and will have no capabili-
ties to check the traffic between their
device and the back-end servers.
“By creating a secure partition, users
can be prevented from loading apps
onto it, with only company-approved
apps available to them. The user can still install apps on their
part
of the device, but these will not have access to corporate data.”
Priority’s Richter says the best tip is to understand where in the
business a mobility strategy will add value. “Is it more
important
for your HR and accounting team to be mobile, or your field
ser-
vice reps?” he says. “Instead of trying to do everything at once,
being selective about which parts of the business would benefit
from going mobile will increase the chances of a strategy
sticking.”
Nfon’s Leach says line managers must be confident that staff
are aware how to use, and are using, technologies available, so
employees are just as effective at their job when out of the
office.
“There also need to be clear policies for working from home,
such as allocated days and shared calendars,” he says. “But the
most crucial factor to ensure a successful mobile strategy is cre -
ating a positive culture for mobile working. Do employees feel
comfortable asking to work from home and then doing so? Do
you trust them to work, or do you think they will be swilling tea
all day while signing for neighbours’
Amazon deliveries?”
In the next few years, 5G networks
will be commercialised. 5G devices
should consume less energy and
improve battery life, so 5G networks
will have higher data rates and lower
latency than previous generations.
These new networks will come with
features to give companies better
mobility and flexibility. This will be
useful for SMEs with remote employees being able to work any-
where and retain workplace-like bandwidth and connectivity.
The internet experience of 5G for field staff will be better in a
number of ways. Internet-connected vehicles and machinery can
be monitored in real time more easily. It should also be easier
to
get analytical data into management hands to enable quicker
decisions, wherever employees are. These factors should make
an impact on a business’s productivity. n
MOBILE TECHNOLOGY
“The mosT crucial facTor To
ensure a successful mobile
sTraTegy is creaTing a posiTive
culTure for mobile working”
myLes Leach, nfon uk
http://www.computerweekly.com
https://searchdatacenter.techtarget.com/opinion/Organizations -
dont-have-to-pick-private-or-public-cloud
https://www.computerweekly.com/news/450301049/UK-
government-paves-way-for-Amazon-Prime-Air-trials
https://www.computerweekly.com/feature/The-future-of-5G-
mobile-networks-support-and-development
Copyright of Computer Weekly is the property of TechTarget,
Inc. and its content may not be
copied or emailed to multiple sites or posted to a listserv
without the copyright holder's
express written permission. However, users may print,
download, or email articles for
individual use.

More Related Content

Similar to Accounting and Management Information Systems Vol. 18, No.

Impact of M-Commerce Technologies on Developing Countries
Impact of M-Commerce Technologies on Developing CountriesImpact of M-Commerce Technologies on Developing Countries
Impact of M-Commerce Technologies on Developing Countriesijtsrd
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docxnovabroom
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docxhyacinthshackley2629
 
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...ijtsrd
 
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...IJNSA Journal
 
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET Journal
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYIJITE
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY IJITE
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning SecurityIJITE
 
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanConsumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanIOSRJBM
 
20687-39027-1-PB.pdf
20687-39027-1-PB.pdf20687-39027-1-PB.pdf
20687-39027-1-PB.pdfIjictTeam
 
ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19
ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19
ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19q3technical
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...ijaia
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...ijaia
 
The Internet of Things in insurance
The Internet of Things in insurance The Internet of Things in insurance
The Internet of Things in insurance Andrea Silvello
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...AIRCC Publishing Corporation
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxtodd521
 
Adapting to new technology.edited
Adapting to new technology.editedAdapting to new technology.edited
Adapting to new technology.editedSadafZZaidi
 

Similar to Accounting and Management Information Systems Vol. 18, No. (20)

Impact of M-Commerce Technologies on Developing Countries
Impact of M-Commerce Technologies on Developing CountriesImpact of M-Commerce Technologies on Developing Countries
Impact of M-Commerce Technologies on Developing Countries
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx
 
19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx19Ring DoorbellStudent’s NameInstitutiona.docx
19Ring DoorbellStudent’s NameInstitutiona.docx
 
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
Enhancing Cybersecurity for Mobile Applications A Comprehensive Analysis, Thr...
 
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
CYBER SECURITY OF SMART WATCHES : A REVIEW OF THE VULNERABILITIES WITH RECOMM...
 
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
 
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of PakistanConsumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
Consumer Intention to Adopt Smartphone Apps: An Empirical Study of Pakistan
 
20687-39027-1-PB.pdf
20687-39027-1-PB.pdf20687-39027-1-PB.pdf
20687-39027-1-PB.pdf
 
ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19
ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19
ARTIFICIAL INTELLIGENCE & MACHINE LEARNING DURING COVID 19
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
The Internet of Things in insurance
The Internet of Things in insurance The Internet of Things in insurance
The Internet of Things in insurance
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
SMAC
SMACSMAC
SMAC
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
Adapting to new technology.edited
Adapting to new technology.editedAdapting to new technology.edited
Adapting to new technology.edited
 

More from dirkrplav

InstructionsW4 Nightingale Case A & B – 35 points - Individual A.docx
InstructionsW4 Nightingale Case A & B – 35 points - Individual A.docxInstructionsW4 Nightingale Case A & B – 35 points - Individual A.docx
InstructionsW4 Nightingale Case A & B – 35 points - Individual A.docxdirkrplav
 
InstructionsView CAAE Stormwater video Too Big for Our Ditches.docx
InstructionsView CAAE Stormwater video Too Big for Our Ditches.docxInstructionsView CAAE Stormwater video Too Big for Our Ditches.docx
InstructionsView CAAE Stormwater video Too Big for Our Ditches.docxdirkrplav
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxdirkrplav
 
InstructionsUse and add the real life situation provided below t.docx
InstructionsUse and add the real life situation provided below t.docxInstructionsUse and add the real life situation provided below t.docx
InstructionsUse and add the real life situation provided below t.docxdirkrplav
 
InstructionsThe objective of this assessment is to demonstrate y.docx
InstructionsThe objective of this assessment is to demonstrate y.docxInstructionsThe objective of this assessment is to demonstrate y.docx
InstructionsThe objective of this assessment is to demonstrate y.docxdirkrplav
 
InstructionsThis assignment will be checked using anti-plagia.docx
InstructionsThis assignment will be checked using anti-plagia.docxInstructionsThis assignment will be checked using anti-plagia.docx
InstructionsThis assignment will be checked using anti-plagia.docxdirkrplav
 
instructionss.docxjust to make sure againi need u to ext.docx
instructionss.docxjust to make sure againi need u to ext.docxinstructionss.docxjust to make sure againi need u to ext.docx
instructionss.docxjust to make sure againi need u to ext.docxdirkrplav
 
InstructionsProvide an analysis of the affects of the publics.docx
InstructionsProvide an analysis of the affects of the publics.docxInstructionsProvide an analysis of the affects of the publics.docx
InstructionsProvide an analysis of the affects of the publics.docxdirkrplav
 
InstructionsProblem #Point ValueYour Points14243446526167484915101.docx
InstructionsProblem #Point ValueYour Points14243446526167484915101.docxInstructionsProblem #Point ValueYour Points14243446526167484915101.docx
InstructionsProblem #Point ValueYour Points14243446526167484915101.docxdirkrplav
 
InstructionsPlease answer the following question in a minimum.docx
InstructionsPlease answer the following question in a minimum.docxInstructionsPlease answer the following question in a minimum.docx
InstructionsPlease answer the following question in a minimum.docxdirkrplav
 
InstructionsMy report is about the future of work and focuses the .docx
InstructionsMy report is about the future of work and focuses the .docxInstructionsMy report is about the future of work and focuses the .docx
InstructionsMy report is about the future of work and focuses the .docxdirkrplav
 
InstructionsInstructions for the Microsoft Excel TemplatesThis wor.docx
InstructionsInstructions for the Microsoft Excel TemplatesThis wor.docxInstructionsInstructions for the Microsoft Excel TemplatesThis wor.docx
InstructionsInstructions for the Microsoft Excel TemplatesThis wor.docxdirkrplav
 
InstructionsResearch and write a brief answer to the following .docx
InstructionsResearch and write a brief answer to the following .docxInstructionsResearch and write a brief answer to the following .docx
InstructionsResearch and write a brief answer to the following .docxdirkrplav
 
Instructionsinstructions.docxFinal Lab ReportYou are requ.docx
Instructionsinstructions.docxFinal Lab ReportYou are requ.docxInstructionsinstructions.docxFinal Lab ReportYou are requ.docx
Instructionsinstructions.docxFinal Lab ReportYou are requ.docxdirkrplav
 
INSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docx
INSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docxINSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docx
INSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docxdirkrplav
 
InstructionsEach of your 2 replies must contain at least .docx
InstructionsEach of your 2 replies must contain at least .docxInstructionsEach of your 2 replies must contain at least .docx
InstructionsEach of your 2 replies must contain at least .docxdirkrplav
 
InstructionsInstructions for numberguessernumberGuesser.html.docx
InstructionsInstructions for numberguessernumberGuesser.html.docxInstructionsInstructions for numberguessernumberGuesser.html.docx
InstructionsInstructions for numberguessernumberGuesser.html.docxdirkrplav
 
InstructionsI need 3 pages of the four questions. That is abo.docx
InstructionsI need 3 pages of the four questions. That is abo.docxInstructionsI need 3 pages of the four questions. That is abo.docx
InstructionsI need 3 pages of the four questions. That is abo.docxdirkrplav
 
InstructionsFor this assignment, collect data exhibiting a relat.docx
InstructionsFor this assignment, collect data exhibiting a relat.docxInstructionsFor this assignment, collect data exhibiting a relat.docx
InstructionsFor this assignment, collect data exhibiting a relat.docxdirkrplav
 
InstructionsFor this week’s assignment, you will synthesize the .docx
InstructionsFor this week’s assignment, you will synthesize the .docxInstructionsFor this week’s assignment, you will synthesize the .docx
InstructionsFor this week’s assignment, you will synthesize the .docxdirkrplav
 

More from dirkrplav (20)

InstructionsW4 Nightingale Case A & B – 35 points - Individual A.docx
InstructionsW4 Nightingale Case A & B – 35 points - Individual A.docxInstructionsW4 Nightingale Case A & B – 35 points - Individual A.docx
InstructionsW4 Nightingale Case A & B – 35 points - Individual A.docx
 
InstructionsView CAAE Stormwater video Too Big for Our Ditches.docx
InstructionsView CAAE Stormwater video Too Big for Our Ditches.docxInstructionsView CAAE Stormwater video Too Big for Our Ditches.docx
InstructionsView CAAE Stormwater video Too Big for Our Ditches.docx
 
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docxInstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
InstructionsTITLEF14-2Beginning an 8-column work sheet for a merch.docx
 
InstructionsUse and add the real life situation provided below t.docx
InstructionsUse and add the real life situation provided below t.docxInstructionsUse and add the real life situation provided below t.docx
InstructionsUse and add the real life situation provided below t.docx
 
InstructionsThe objective of this assessment is to demonstrate y.docx
InstructionsThe objective of this assessment is to demonstrate y.docxInstructionsThe objective of this assessment is to demonstrate y.docx
InstructionsThe objective of this assessment is to demonstrate y.docx
 
InstructionsThis assignment will be checked using anti-plagia.docx
InstructionsThis assignment will be checked using anti-plagia.docxInstructionsThis assignment will be checked using anti-plagia.docx
InstructionsThis assignment will be checked using anti-plagia.docx
 
instructionss.docxjust to make sure againi need u to ext.docx
instructionss.docxjust to make sure againi need u to ext.docxinstructionss.docxjust to make sure againi need u to ext.docx
instructionss.docxjust to make sure againi need u to ext.docx
 
InstructionsProvide an analysis of the affects of the publics.docx
InstructionsProvide an analysis of the affects of the publics.docxInstructionsProvide an analysis of the affects of the publics.docx
InstructionsProvide an analysis of the affects of the publics.docx
 
InstructionsProblem #Point ValueYour Points14243446526167484915101.docx
InstructionsProblem #Point ValueYour Points14243446526167484915101.docxInstructionsProblem #Point ValueYour Points14243446526167484915101.docx
InstructionsProblem #Point ValueYour Points14243446526167484915101.docx
 
InstructionsPlease answer the following question in a minimum.docx
InstructionsPlease answer the following question in a minimum.docxInstructionsPlease answer the following question in a minimum.docx
InstructionsPlease answer the following question in a minimum.docx
 
InstructionsMy report is about the future of work and focuses the .docx
InstructionsMy report is about the future of work and focuses the .docxInstructionsMy report is about the future of work and focuses the .docx
InstructionsMy report is about the future of work and focuses the .docx
 
InstructionsInstructions for the Microsoft Excel TemplatesThis wor.docx
InstructionsInstructions for the Microsoft Excel TemplatesThis wor.docxInstructionsInstructions for the Microsoft Excel TemplatesThis wor.docx
InstructionsInstructions for the Microsoft Excel TemplatesThis wor.docx
 
InstructionsResearch and write a brief answer to the following .docx
InstructionsResearch and write a brief answer to the following .docxInstructionsResearch and write a brief answer to the following .docx
InstructionsResearch and write a brief answer to the following .docx
 
Instructionsinstructions.docxFinal Lab ReportYou are requ.docx
Instructionsinstructions.docxFinal Lab ReportYou are requ.docxInstructionsinstructions.docxFinal Lab ReportYou are requ.docx
Instructionsinstructions.docxFinal Lab ReportYou are requ.docx
 
INSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docx
INSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docxINSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docx
INSTRUCTIONSInstructionsPlease evaluate, display, and interpret t.docx
 
InstructionsEach of your 2 replies must contain at least .docx
InstructionsEach of your 2 replies must contain at least .docxInstructionsEach of your 2 replies must contain at least .docx
InstructionsEach of your 2 replies must contain at least .docx
 
InstructionsInstructions for numberguessernumberGuesser.html.docx
InstructionsInstructions for numberguessernumberGuesser.html.docxInstructionsInstructions for numberguessernumberGuesser.html.docx
InstructionsInstructions for numberguessernumberGuesser.html.docx
 
InstructionsI need 3 pages of the four questions. That is abo.docx
InstructionsI need 3 pages of the four questions. That is abo.docxInstructionsI need 3 pages of the four questions. That is abo.docx
InstructionsI need 3 pages of the four questions. That is abo.docx
 
InstructionsFor this assignment, collect data exhibiting a relat.docx
InstructionsFor this assignment, collect data exhibiting a relat.docxInstructionsFor this assignment, collect data exhibiting a relat.docx
InstructionsFor this assignment, collect data exhibiting a relat.docx
 
InstructionsFor this week’s assignment, you will synthesize the .docx
InstructionsFor this week’s assignment, you will synthesize the .docxInstructionsFor this week’s assignment, you will synthesize the .docx
InstructionsFor this week’s assignment, you will synthesize the .docx
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 

Accounting and Management Information Systems Vol. 18, No.

  • 1. Accounting and Management Information Systems Vol. 18, No. 1, pp. 101-118, 2019 DOI: http://dx.doi.org/10.24818/jamis.2019.01005 Facing the mobile revolution: A Romanian insight Victoria Stanciua1 and Mirela Gheorghea a The Bucharest University of Economic Studies, Romania Abstract Research question: Are the accounting graduates prepared to deal with mobile devices’ security issues? Motivation: Nowadays, mobile computing is a part of the younger generation, the entering workforce in coming years, and from this point of view the BYOD (Bring Your Own Device) approach will continue its increasing trend. The authors investigated the accounting bachelors’ knowledge in regard with
  • 2. mobile devices’ use aiming at signaling the existing gap on mobile devices’ security awareness. IT security specialists consider that both, academia and industry should focus their security awareness campaigns aiming at combat the false sense of security that mobile devices’ users have. Idea: The authors aimed at providing an in-depth understanding of the accounting students’ profile as mobile devices’ users and their knowledge and awareness in regard with mobile security threats. Data: The analyzed sample includes 180 subjects, out of which 81% are bachelors in accounting (38% 1st year; 43% 3rd year) and 19% master students in accounting and banking. Tools: The literature review helped us in structuring our research objectives and design a multiple-choice questionnaire used in the empirical study. Findings: The study reflects the students’ insufficient information in regard with mobile devices features and security issues. This is the result of the limited IT lectures and seminars in the curriculum and the insufficient focus on
  • 3. mobile devices’ use in the accounting profession. Students should understand the mobile devices as complex devices providing diverse features, not limited to communication with friends and Internet information searching. Contribution: The study contributes towards closing the existing gap in the Romanian research and literature in regard with young generation insufficient knowledge on mobile devices’ security and the potential threat brought by BYOD on the companies’ IT environment. 1 Corresponding author: Department of Management Information Systems, The Bucharest University of Economic Studies; 6 Piata Romana, Bucharest; tel. (+40) 0213191901; email address: [email protected] Facing the mobile revolution: A Romanian insight 102 Vol. 18, No. 1
  • 4. Keywords: Mobile devices, threat, mobile security, BYOD JEL Codes: A2, I25, M15 1. Introduction Gadgets such smartphones and tablets brought a new lifestyle across generations. “Mobile devices are paying a larger role, not only in business but social media” and people’s personal life (Grant Thornton, 2013). The Y generation is the one that embraces natively the mobile devices’ use and this new lifestyle. On the other hand, companies are looking for business increase, higher efficiency, more visibility in the virtual space and improved relationship with clients and partners. The solution stays in mobile devices that bring lots of advantages together with business transformation and the new cultural challenge of mobile culture, altogether reshaping the business processes and rules. But let’s look at the second facet of the coin: mobile devices’ use is accompanied by a diverse and concerning
  • 5. set of security risks. The companies are aware that it is a high likelihood that sensitive information or data will be sent or received via mobile devices (Grant Thornton, 2013). “Securing organizational data and protecting personally identifiable information is not possible unless mobile devices are secured” (Gearns, 2016: 36). In this new complex IT environment, the companies face the security risks from a new perspective. This risk approach emphasizes the need for a threat intelligent program and imposes integrated solutions, protecting the companies’ network, applications and the diverse mobile devices’ infrastructure. The companies understood that they have to align their operating model to the digital world, to manage their complex and continuo usly evolving IT environment embedding in it all the new gadgets that are now part of employees’ lifestyle. Specialists consider that companies demonstrating lack of “confidence in their ability to implement emerging technologies should see this as a
  • 6. concern” (Kluver, 2013: 10). Nowadays, the mobile culture is deepened rooted in the companies’ business processes. Companies worldwide are now opened to the mobile devices usage, being aware of mobile computing advantages. The BYOD (Bring Your Own Device) wave overflows the companies’ IT environment. A survey performed in 2014 emphasized that 63% of the respondents declared that their employees are using, on daily bases, smartphones and tablets, 46% declared that the employees are using just smartphones and 29% of the employees are using tablets. The same survey revealed that 90% of the respondents allow in their companies some mix of personal and business own mobile devices (ISMG, 2015). As a result, we can conclude that BYOD concept has already reshaped the way employees perform the job requirements and the companies’ culture. It shouldn’t be forgotten that “mobile Accounting and Management Information Systems
  • 7. Vol. 18, No. 1 103 computing is a part of the younger generation entering in the workforce in coming years” (Madan et al., 2013:4) and from this point of view the BYOD will continue its increasing trend. Even if the young generation is so opened to the mobile devices’ use it is observed a lack of mobile security knowledge reflected in the users’ behavior and security practices. A survey issued in 2014 emphasized the IT security specialists’ opinion that “employees behavior is a significant factor for information security” (Dimensional Research, 2014: 2). IT security specialists consider that since the mobile users “do not actively follow most of the security best practice, academia and industry should focus their security awareness campaigns and efforts in order to combat the false sense of security that users have” (Androulidakis, 2016:9). The authors totally agree with the above mentioned opinion and conducted their research on
  • 8. the young generation use of mobile devices aiming at emphasize their mobile users’ profile and security knowledge. The research investigated the students’ mobile devices’ security awareness and personal practice behavior, the gaps in the students’ training on the topic and the universities’ role in preparing the young generation of accountants to face the mobile devices’ culture and security challenges. The research revealed significant gaps regarding the mobile security knowledge and awareness in the context of an extended use of mobile devices by accounting students. The complexity of the software, complicated settings and difficulties in performing updates are the causes for no security measures’ use declared by the respondents. The authors consider that bachelor students need more theoretical training and specific mobile devices’ security skills. There is still room for more focus, in the computing classes, on detailed approaches in regard with accounting automated processing flows and their security issues.
  • 9. The present study is part of a wider research started two years ago focusing on the mobile computing impact of the accounting profession and the accounting students’ options for mobile devices use. The present study contributes towards closing the existing gap in the Romanian research and literature in regard with young generation insufficient knowledge on mobile devices’ security and the potential threat brought by BYOD on the companies’ IT environment. The paper is structured as follows: the following section, Section 2, reports on the literature review on mobile devices’ increased use and mobile devices’ specific security issues. Section 3, discusses the research methodology, objectives and methods. Section 4 retains the main findings and conclusions of the empirical study. The research conclusions are synthetized in the final section, Section 5, emphasizing the insufficient knowledge of the mobile devices’ users on security
  • 10. threats affecting the companies’ information security in the context of the BYOD trend. Facing the mobile revolution: A Romanian insight 104 Vol. 18, No. 1 2. Literature insights on mobile device use and security Global sales of smartphones registered, according Gartner’s analysis, an important increase in the first quarter of 2017, 9.1% comparing with the Q1 of 2016, meaning 380 million units. The operating systems for those worldwide sales reflect the domination of Android OS (86.1%) and iOS, 13.7% (Gartner, 2017). This market share consolidates the previous years of dominance of Android and iOS. Taking into consideration the market share, it is not surprising that IT specialists view these mobile platforms as the greatest risks for their companies (Dimensional
  • 11. research, 2014). The cybercriminals will always focus on most numerous targets presenting same week points. The sales increase reveals the users’ preference for the above mentioned mobile platforms and users’ trend of spending more to get a better smartphone. The number of global tablet users registers a continuous increase from 840 million in 2014 at 1.32 billion in 2017 being expected 1.46 billion users in 2020 (Statista, 2017). The global tablets’ market registered ups and downs, the increase being less dynamic during the years, Apple and Samsung continuing their domination. ISACA specialists consider that mobile computing devices’ vulnerabilities exist in: the device itself, the wireless connection, the user’s personal practices, the organization’s infrastructure and wireless peripherals (e.g. printers, keyboard, mouse etc.). NIST emphasizes seven aspects that define a model for all threats of mobile device
  • 12. (NIST, 2013): 1. Lack of physical security controls: compared to other devices, the mobility of smartphones and tablets exposes them at the risk of being stolen or lost, fact that affects data confidentiality. This statement is confirmed by all the international surveys analyzed by the authors, surveys that indicate stolen and lost mobile devices as one of the most significant treat in regard with mobile devices. 2. Use of untrusted mobile devices: in the current way of manufacturing the mobile devices and also in the OSs there are not implemented suitable security restrictions comparing to those available on a PC or laptop this being explained by the mobile devices initial usage destination. 3. Use of Untrusted Networks: the mobile devices can use non- organizational network for Internet connection. The data communication is based on technology such as Wi-Fi or cellular networks. Wireless capability poses a number of specific security risks.
  • 13. 4. Use of Untrusted Applications: the facility of searching and installing apps specifically designed for those devices (games, WhatsApp, Snapchat etc.) is a Accounting and Management Information Systems Vol. 18, No. 1 105 characteristic that provides a high level of satisfaction to the users but poses obvious security risks. 5. Interaction with Other Systems: mobile devices may interact with other systems in terms of data exchange and storage and, as a result, this interaction raises important security issues. 6. Use of Untrusted Content. 7. Use of Location Services: mobile devices with GPS capabilities typically run as location services. The critical question in regard with mobile use is why these devices raise significant security issues? It should be mention that mobile devices began as a
  • 14. consumer technology, and as a result, “many of these devices lack the security and administrative functions that IT and security teams use to manage traditional endpoints such as laptops and desktops” (McEnaney, 2016). Nowadays, cyber criminals focus a significant part of their attacks on mobile devices, being aware of the existing security weak points. Security specialists and more informed users understood that no one is immune to cyber-attacks and day by day it is more difficult to secure mobile devices. But it is a large segment of mobile devices’ users being not informed or insufficient informed in regard with mobile devices’ communications and apps issues this fact being reflected in their behavior. “Excessive confidence could lead to “relaxation” of security practices while excessive fear certainly hinders technology adoption and especially mobile downloading” (Androulidakis, 2016: 9). As a conclusion, aiming at benefit from the mobile devices advantages there is a stringent need to inform the mobile users
  • 15. in regard with the important mobile security issues and make them aware with the existing threats. Improving the mobile users’ behavior as a result of their increased security awareness will be beneficial for the individuals as well as the companies that adopted BYOD. As it is already mentioned, compared to personal computers, mobile devices (including smartphones and tablets) are threatened by a larger variety of factors determined by technical characteristics such as: data communication via Wi-Fi or other Internet connections, video camera, microphone, data storage systems, GPS connectivity etc. ISACA specialists believe that the most common risk factors that apply to using mobile devices are: device-specific malware; theft of sensitive data; exposure of critical information through wireless sniffers; wireless intruders capturing emails, email addresses and attached data; loss, theft or damage of the device (ISACA, 2016). The first virus, a Trojan, affecting Palm devices was identified
  • 16. in 2000. Cabir, “the first malicious code that can spread itself exploiting the network technologies on mobile devices” (Bluetooth) to infect other device was identified in 2004 (La Polla Facing the mobile revolution: A Romanian insight 106 Vol. 18, No. 1 et al., 2013: 449). Not long ago, two malware, Gooligan and HummingBad, affected millions of phones. Gooligan has taken hold of about 10 million Android phones. The Google accounts were breached being obtained personal and sensitive data (Hautala, 2016; Check Point Research Team, 2016). Two families of mobile banking Trojans, Faketoken and Marcher, were created to steal payment details from Android devices. In the Facktoken case it should be mentioned the resourcefulness of the attack: when the user visits its online banking account, the Trojan modifies the page and asks the user to download an Android application to
  • 17. secure the transaction. As a result, the cybercriminal gains access to the user’s banking account (Kaspersky, 2015). These are some examples of cyber-attacks on mobile phones demonstrating the virulence and increasing sophistication of the mobile attacks methods. The continuous growing of mobile malware is expecting to continue due to the widespread of mobile devices. The 2017 survey of Dimensional Research signals that malware (58% of the respondents) and phishing using text messages (54% of the respondents) were the most frequent types of attacks on mobile phones registered by the companies. In 2015, in Romania, the mobiles using Android OS experienced ransomware attacks; the source of attacks was represented by spam e-mail having as attachments infected files or archives. The 2017 PWC survey emphasized that 28% of the respondents “reported security compromises of mobile devices, and securing smartphones and tablets is clearly top of mind” for the IT security specialists (PWC, 2017: 9). The IT security
  • 18. professionals fight against mobile devices’ attacks issued by cybercriminals is extremely difficult. They deal with many products, from multiple vendors, determining significant costs to configure and manage all these mobile devices and having insufficient budgets so that many companies do not use advanced mobile cyber-attack protection solutions (Dimensional Research, 2017). In this context, it is obvious that security professionals consider as the top three inhibitors for the full deployment of mobile workforce: privacy, device security and content security (Information Security Media Group, 2015). The mobile devices’ security must be accompanied by a secure mobile communication. Aiming at ensuring confidentiality and data integrity the security specialists should identify the most adequate security mechanisms (as for example mobile token or a link-layer) and promote authentication so that the receiver to trust the source of the message. Mobile devices’ security implies a set of controls as for
  • 19. example (ISMG, 2015; PWC, 2017): - Devices’ management (enforcing passcodes, malware prevention etc.); Accounting and Management Information Systems Vol. 18, No. 1 107 - Controlling users’ login time, patterns of access and type of device; - Applications’ security, implying vulnerabilities testing and permanent updates; - Enterprise data encryption; - Screen locks; - A risk based mobile access decision in regard with the companies’ resources; - Transactions’ security (end-to-end encryption, transaction risk scoring etc.); - Restricted sharing of the company content with non-company approved applications etc. A centralized and coherent BYOD policy is for now compulsory for any company. Adopting this policy is not an easy task, IT professionals having to take into consideration and balance several factors:
  • 20. - the need to understand the company’s mobile computing pattern and the entire set of potential security risks induced by the mobile devices’ use; - it is difficult to decide how to drown the line on enforcing security and usage policy as long as the device is not own by the company; - the personal and company’s data and applications are on the same devices; - the policy should be articulated with the entire set of IT policies and reflect the integrated information security defined for the company; - there is a new paradigm that impacts the company’s culture and employees’ behavior that should reflect an increased awareness on mobile threats. The companies are aware that they should integrate the new technologies in their digital ecosystem this being a very demanding and challenging objective. There is an increasing dynamic of the innovation in the IT industry and the companies should be prepared to understand and assimilate all these technological changes integrating them in the business and management models. The effort continues on
  • 21. the IT maintenance layer and monitor of the mobile device. Facing so diverse and challenging information security threats, IT specialists became aware of the need to have a threat intelligent program. Starting from the security professionals’ conclusion that employees are a great threat to security, greater than cybercriminals and their behavior could make the “difference in preventing high-profile security breaches” (Dimensional Research, 2014) the authors investigated The Bucharest University of Economic Studies’ students’ knowledge and awareness on mobile security issues. The study’s results are synthetized in the section 4. Facing the mobile revolution: A Romanian insight 108 Vol. 18, No. 1 3. Methodology
  • 22. The authors’ research had two coordinates: a qualitative one aiming to identify the security issues, characteristics and trends in mobile devices’ use and, a second one, aiming at performing and empirical study in regard with the accounting students’ use of mobile devices and their knowledge and practices in regard with mobile devices’ security. The authors performed a systematic literature review on mobile devices’ use and security. The literature review helped us in structuring our research objectives and design the questionnaire used in the empirical study. The authors focused on researches performed worldwide in regard with the mobile devices’ use in business processes and specific issues raised in the IT risk management, synthetizing the main problems emphasized by the researches and analysing the surveys issued by prestigious international organizations. The empirical study is based on a survey aiming to reveal the users’ practices and awareness in regard with mobile devices. The students in The
  • 23. Bucharest University of Economic Studies (the last year of bachelor degree and master students) represent the target group. The criteria used to establish the target group are [i] the students’ age – the Y generation is more receptive to new technologies and [ii] the graduate students are the new entries in the accounting profession and, from this point of view, it is revealing for the study to investigate their mobile devices’ practices and security awareness. In the study was used a multiple-choice questionnaire containing 21 questions structured in two parts: in the first part were included demographic questions aiming to retain the students’ gender, field and level of study. The second part included questions focusing on the nature, characteristics, practices and security perception of the users’ in regard with mobile devices. We collected 180 questionnaires, none of them being rejected. The respondents’ sample is representative for the analyzed population. The
  • 24. subjects are accounting bachelors and students from accounting and finance and banking master programs. The data collection was performed between October 2017 and January 2018. The present survey extends the previous one performed during October 2016 and December 2017 aiming at enlarging our research on the mobile devices’ use and security impact in the accounting profession and consolidates the previous research conclusions. Accounting and Management Information Systems Vol. 18, No. 1 109 4. Results and discussion The authors conducted the data analysis starting from the following questions: 1. Which is the students’ behaviour as mobile devices’ users? 2. What are the aspects influencing the students in mobile
  • 25. device purchase? 3. Which is the students’ perception on the education/training in mobile security field? 4. Which are the security measures implemented by the students on their mobile devices? 5. Which are the reasons of not using security measures? 6. Which are the security incidents experienced by the students in the past 2 years? The structure of the analyzed sample includes: 180 subjects, out of which 81% are bachelor’s in accounting (38% 1st year; 43% 3rd year) and 19% master students in accounting and banking. From the entire sample 14% respondents are males and 86% females. The study reveals that all the students questioned use at least one mobile device and among them a major part owns a smartphone (99%) and a laptop (86%). Table 1. Types of mobile devices used by students
  • 26. Type Frequency Smartphone 99% Laptop 86% Tablet 28% MP3 Player 6% Cell phone 1% Within the questionnaire a number of questions tried to investigate the students’ views upon the mobile devices technical features. In this regard, one of the questions analyzed the elements that can influence the buyer (on a scale of 1 to 7) while choosing a device. The results highlighted that the most important factor is the producer, followed by the price and the operating system. The last places were occupied by the connectivity and the service systems.
  • 27. Facing the mobile revolution: A Romanian insight 110 Vol. 18, No. 1 Figure 2. Factors influencing the decision to acquire a mobile device The authors proceeded to another analysis aiming at create a scale for the technical features of the mobile devices. The analysis emphasizes that battery autonomy, operating system, storage capacity and RAM size are the main preferences of the students. Last places are taken by interoperability, screen size, keyboard and weight. The security is somewhere in between, fact that represents a healthy reasoning that proves a certain awareness. Figure 3. Technical features priorities The following questions focused on the security of the mobile devices. On this purpose, we asked the subjects: How important is the security
  • 28. for them? At which level do they estimate their mobile devices’ security? How did their behaviour evolve towards information security in the past year? The students’ answers reveal interest for the topic in discussion, 63% consider that they implemented good security solutions, 26% are not sure and 11% think they are not using enough Accounting and Management Information Systems Vol. 18, No. 1 111 security measures. The great majority of the respondents consider they are more aware on security need then in the previous years. This is in line with the respondents’ opinion in our 2017 survey. Other issues refer to the level of education/training in information security field. We can observe that a great majority (40%) learned about this subject online, 20% from the university lectures and 11% claimed that nobody taught them.
  • 29. Figure 4. Where did you learn about information security? The subjects’ point of view regarding information security education is that every person should receive this sort of information (132 students) or search about it on their own (60 students). Again, as the 2017 survey revealed, the mobile security information is collected individually, the Internet being the main source. The academic curricula did not significantly improve the students’ knowledge and behaviour in regard with mobile devices’ security. There is still room for security training in the university’s curriculum. Table 2 The respondents’ point of view in regard with information security education Assertions about education Frequency Everyone should receive information on information security 49% Employees of companies need to have knowledge of information
  • 30. security 14% Information security must be taught in schools 12% Everyone should be documented about the security of information 22% Education in the field is not required if the security software is used 1% Education in the field is only needed by IT specialists 2% Facing the mobile revolution: A Romanian insight 112 Vol. 18, No. 1 Regarding the measures of security used by the subjects and also the reasons why they wouldn’t use them we obtained the following results: 69% claim that they are using anti-virus software, 12% firewall, 8% software anti-spam and only 6% are not using any security methods.
  • 31. Figure 5. Security measures implemented on the computer/telephone Considering the data and information security coverage the respondents indicated as the most used protection measures - backup files (52%), periodically change of the passwords (30%) and encryption of important files (12%). The respondents’ answers focus more on laptops than smartphones that reflecting the connection they make between laptops (computers) and IT threats being less aware on mobile security issues. The students’ answers did not indicate specific smartphones’ security measures. Figure 6. Security measures to protect data Accounting and Management Information Systems Vol. 18, No. 1 113
  • 32. The respondents indicated their reasons for not using security measures: 33% believe that setting the security system is too complicated, 32% consider that the updates and backups imply complex software knowledge, 22% think it’s too expensive, 13% don’t feel the need. Even if we expected the costs to be reported as the top obstacle it can be seen that the situation is quite alarming, the respondents’ answers indicated insufficient knowledge and skills. Table 3 Why did you not use security measures? Reasons for security measures No. of respondents % It costs money 40 22% Their setting is complex 60 33% Update, back-up settings involve complex software 57 32% I do not feel the need for security measures 23 13% The students’ opinion is that the most important disadvantages of the security measures are: the need of special technical installation
  • 33. knowledge (37%) and the cost (36%). Figure 7. Disadvantages of security measures … computerweekly.com 15-21 May 2018 24 When budgets are tight, as they are for most small and medium- sized enterprises (SMEs), having a mobile strategy may seem an extravagance. However, most businesses use mobile devices in one way or another, so maximising their usefulness is a must. According to the Office for National Statistics (ONS), the num- ber of people who regularly work from home has risen to 4.2 mil- lion in the past decade and it is expected that half of the UK’s workforce will be working remotely by 2020. Also, the latest figures from the Department for Business, Energy and Industrial Strategy (BEIS) show that 16.1 million people work for SMEs – 60% of all private sector employment in the UK. Myles Leach, managing director at voice-over-IP (VoIP) firm Nfon UK, says it stands to reason that SMEs are, and will con- tinue to be, affected by this change in working trends. “Employees need and want to have the opportunity to work flexibly,” he says. “But crucially, it benefits the SME. It saves on office space and costs. Operations can continue when a site is shut because of bad
  • 34. weather or maintenance. There will be fewer staff sick days as they can still work in school holidays and when children are ill.” Bringing moBile into smes What works for one SME may not work for another, but before adopting a mobility strategy, it is important to look at what is already in place to see where changes are needed. According to Andres Richter, CEO at cloud ERP (enterprise resource planning) specialist Priority Software, when his firm carried out a survey of 500 UK senior decision-makers, more than one-third did not Find the right mobility strategy For your sme Small companies need a strategy to make the most of staff mobility, so what should business owners look out for? Rene Millman reports MOBILE TECHNOLOGY JESUSSANZ/GETTY Home http://www.computerweekly.com https://www.computerweekly.com/indepth/IT-for-small-and- medium-sized-enterprises-SME https://www.computerweekly.com/resources/Smartphone- technology http://smallbusiness.co.uk/half-uk-workforce-remotely-2020- 2540827/ https://www.gov.uk/government/statistics/business-population- estimates-2017 https://searchunifiedcommunications.techtarget.com/answer/Ho
  • 35. w-do-you-configure-VoIP-on-a-network https://searcherp.techtarget.com/definition/cloud-ERP https://www.techtarget.com/contributor/Rene-Millman computerweekly.com 15-21 May 2018 25 Home News As Brexit gets ever closer, is the UK government technologically ready? Better understanding needed to get cyber security products to market, says NCSC Wagamama uses its noodle to satisfy diners Editor’s comment Buyer’s guide to big data Serverless computing: What it is and why it matters Find the right mobility strategy for your SME
  • 36. Downtime have the correct technology to support mobile working, and 43% could not perform business- critical functions on a mobile application. “If the company already has business software applications in place, it should see if its vendors already offer mobility tools,” says Richter. “For example, many modern ERP systems now support mobile application generators, which allow users to create a range of applications from their mobiles and use them to perform core business processes no matter where they are. These can be created in a matter of minutes, and don’t require high levels of IT expertise – perfect for SMEs looking to enhance their mobility strategy using existing technology.” Jon Wrennall, CTO at cloud software supplier Advanced, says SMEs should put employees at the heart of their mobile strategy, “empowering them to use mobile technology to streamline their tasks and minimise the chances of departments working in silos”. cloud is a key driver Wrennall says SMEs can use the cloud to help facilitate mobile working, enabling users to work on the move and still have all the real-time information they need at their fingertips. “The cloud is a key driver in making mobile strategies success - ful, but implementing such a strategy is often seen as a bold move as some SMEs lack confidence in adoption and don’t understand the positive role it can play,” he adds.
  • 37. “SMEs should look to take incremental steps. For example, they can trial mobile technology with a select set of employees, who can share feedback with those that are not yet familiar with it. It also enables SMEs to assess areas for improvement.” Wrennall says that when it comes to devices and service choice, not everyone is familiar with mobile technology. Some will be more receptive to new working practices, while others may not. “SMEs should give more support to those that need it and educate them on the benefits of mobile and cloud,” he says. “They should work closely with staff to find out their pain points. This will determine what devices and services they choose to implement.” due diligence Wrennall says a move to a mobile strategy should be consid- ered with the same level of due diligence as any other signifi - cant investment within a business. Before choosing what device or service to adopt, SMEs must consider how a transition will affect their staff and customers, and choose a provider that can illustrate a clear and structured pathway for moving staff and data to mobile technology as smoothly as possible. “Device and service providers must be able to show they are going to be a long-term value-adding partner and that they are in it for the long haul,” says Wrennall. Organisations would be well advised to use just one type of device or at least minimise the number of unique hardware/soft-
  • 38. ware configurations, says Jack Zubarev, president at Parallels, a supplier of desktop and application virtualisation software. “The cost of delivering and supporting applications simply increases MOBILE TECHNOLOGY ❯ Food retailer Co-op plans to introduce a smartphone self-checkout system so that customers can pay for goods without visiting a till. http://www.computerweekly.com https://searcherp.techtarget.com/feature/Why-ERP-mobility- requires-enterprises-to-be-proactive https://www.oneadvanced.com/news-and-opinion/cloud-will- only-reach-tipping-point-if-smes-become-confident-adopters/ https://www.brianmadden.com/opinion/VMware-and-Parallels- both-announced-new-versions-of-their-client-hypervisors- yesterday https://www.computerweekly.com/news/252436317/Co-op- trials-pay-in-aisle-technology https://www.computerweekly.com/news/252436317/Co-op- trials-pay-in-aisle-technology https://www.computerweekly.com/news/252436317/Co-op- trials-pay-in-aisle-technology https://www.computerweekly.com/news/252436317/Co-op- trials-pay-in-aisle-technology https://www.computerweekly.com/news/252436317/Co-op- trials-pay-in-aisle-technology computerweekly.com 15-21 May 2018 26
  • 39. Home News As Brexit gets ever closer, is the UK government technologically ready? Better understanding needed to get cyber security products to market, says NCSC Wagamama uses its noodle to satisfy diners Editor’s comment Buyer’s guide to big data Serverless computing: What it is and why it matters Find the right mobility strategy for your SME Downtime with each unique device/software combination,” he adds. “Further device replacement and refresh will become far less expensive if
  • 40. one can standardise not just on device vendors, but on the spe- cific configurations. “But then again, most organisations do not have the luxury of this standardisation as employees bring their own devices. In this case, universal remote delivery of applications to any device is likely to provide the most cost-effective solution and isolate soft- ware delivery from underlying device hardware.” making moBility secure SMEs are in as much danger from cyber criminals as larger enter- prises. David Emm, principal security researcher at Kaspersky Lab, says that if SMEs overlook mobile security, they risk leaving a big gap in their security defences. He says his firm detected 5,730,916 malicious installation packages, 94,368 mobile bank- ing Trojans and 544,107 mobile ransomware Trojans in 2017. “One of the dangers is that mobile technology ‘creeps’ into the business and isn’t necessarily considered in the same way as desktop or laptop security,” he says. “Consider the BYOD [bring your own device] trend, for example, where staff use their own devices for business,” he says. “This isn’t a bad thing per se, but businesses must include mobile in their risk assessment, just as they would for any other technology – look at what assets they have, how they are used, how data is stored/moved, who has access to it, who might want it, and how they might try to access it. In this sense, mobile secu- rity should be considered as part of an overall security strategy.”
  • 42. Buyer’s guide to big data Serverless computing: What it is and why it matters Find the right mobility strategy for your SME Downtime One of the biggest trends affecting mobile strategy and secu- rity is BYOD. “No longer can organisations insist on a device to be used by staff,” says Clive Longbottom, service director at Quocirca. “This is made worse by the changes in workforce – con- tractors, consultants, specialists and so on cannot be forced to use a specific device, but can be forced to allow the organisation to create a secure partition on their device.” Employees at smaller firms may not realise, when download- ing an app, where that app came from. “Employees can search an app store and find any number of apps that purport to be able to do what they want,” says Longbottom. “Individuals tend not to even check where the developer comes from – maybe Russia or China – and will have no capabili- ties to check the traffic between their device and the back-end servers. “By creating a secure partition, users
  • 43. can be prevented from loading apps onto it, with only company-approved apps available to them. The user can still install apps on their part of the device, but these will not have access to corporate data.” Priority’s Richter says the best tip is to understand where in the business a mobility strategy will add value. “Is it more important for your HR and accounting team to be mobile, or your field ser- vice reps?” he says. “Instead of trying to do everything at once, being selective about which parts of the business would benefit from going mobile will increase the chances of a strategy sticking.” Nfon’s Leach says line managers must be confident that staff are aware how to use, and are using, technologies available, so employees are just as effective at their job when out of the office. “There also need to be clear policies for working from home, such as allocated days and shared calendars,” he says. “But the most crucial factor to ensure a successful mobile strategy is cre - ating a positive culture for mobile working. Do employees feel comfortable asking to work from home and then doing so? Do you trust them to work, or do you think they will be swilling tea all day while signing for neighbours’ Amazon deliveries?” In the next few years, 5G networks will be commercialised. 5G devices should consume less energy and improve battery life, so 5G networks will have higher data rates and lower
  • 44. latency than previous generations. These new networks will come with features to give companies better mobility and flexibility. This will be useful for SMEs with remote employees being able to work any- where and retain workplace-like bandwidth and connectivity. The internet experience of 5G for field staff will be better in a number of ways. Internet-connected vehicles and machinery can be monitored in real time more easily. It should also be easier to get analytical data into management hands to enable quicker decisions, wherever employees are. These factors should make an impact on a business’s productivity. n MOBILE TECHNOLOGY “The mosT crucial facTor To ensure a successful mobile sTraTegy is creaTing a posiTive culTure for mobile working” myLes Leach, nfon uk http://www.computerweekly.com https://searchdatacenter.techtarget.com/opinion/Organizations - dont-have-to-pick-private-or-public-cloud https://www.computerweekly.com/news/450301049/UK- government-paves-way-for-Amazon-Prime-Air-trials https://www.computerweekly.com/feature/The-future-of-5G- mobile-networks-support-and-development
  • 45. Copyright of Computer Weekly is the property of TechTarget, Inc. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.