Date of Defense

4-18-2012

Date of Graduation

4-28-2012

Department

Business Information Systems

First Advisor

Nicholas Andreadis, Lee Honors College

Second Advisor

Richard Gershon, Communication

Third Advisor

Kevin Abbott, Office of Information Technology

Abstract

The mobile device industry has increased exponentially over the past couple decades. This has created a great demand for the devices along with great dependence on their capabilities. There is an assortment of mobile devices among which can be found laptops, tablets, smartphones, and personal music players. All these provide a way of making personal productivity and business capabilities greater. While businesses and the public benefit from the capabilities of these devices, not everyone notices how valuable the information that they handle is. Today’s mobile devices handle information such as contacts, banking details, GPS location, and personal and corporate e-mail to mention a few. Because of the reliance on mobile devices for everything from personal web browsing to banking information, their security is crucial to the owners.

In order to provide proper protection for mobile devices, specific security measures are needed that meet the general security requirements of confidentiality, integrity, and availability. Safeguards such as passwords and locks work but they are not the only nor in some cases the best ways to protect the information inside. With the advancement of the capabilities and convenience these devices provide, we will see more reliance on these devices and therefore a greater and increasing need to protect them. Moreover, there will also be thorough advancements in the means used to protect the devices in the future.

Access Setting

Honors Thesis-Open Access

Share

COinS