- Title
- A model to measure the maturuty of smartphone security at software consultancies
- Creator
- Allam, Sean
- Subject
- Computer networks -- Security measures
- Subject
- Capability maturity model (Computer software)
- Subject
- Smartphones
- Subject
- Wireless Internet
- Subject
- Mobile communication systems
- Subject
- Mobile computing
- Date
- 2009
- Type
- Thesis
- Type
- Masters
- Type
- MCom (Information Systems)
- Identifier
- vital:11135
- Identifier
- http://hdl.handle.net/10353/281
- Identifier
- Computer networks -- Security measures
- Identifier
- Capability maturity model (Computer software)
- Identifier
- Smartphones
- Identifier
- Wireless Internet
- Identifier
- Mobile communication systems
- Identifier
- Mobile computing
- Description
- Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
- Format
- 160 leaves; 30 cm
- Format
- Publisher
- University of Fort Hare
- Publisher
- Faculty of Management & Commerce
- Language
- English
- Rights
- University of fort Hare
- Hits: 2303
- Visitors: 2349
- Downloads: 148
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCEPDF | 2 MB | Adobe Acrobat PDF | View Details Download |