Volltext-Downloads (blau) und Frontdoor-Views (grau)

Ensuring Mobile Device Security and Compliance at the Workplace

  • End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and restrictions would not be accepted by them. On the contrary, companies are obliged to employ substantial organizational and technical measures to ensure data security and compliance when allowing to use mobile devices at the workplace. So far, only individual arrangements have been presented addressing single issues in ensuring data security and compliance. However, companies need to follow a comprehensive set of measures addressing all relevant aspects of data security and compliance in order to play it safe. Thus, in this paper at first technical architectures for using mobile devices in enterprise IT are reviewed. Thereafter a set of compliance rules is presented and, as major contribution, technical measures are explained that enable a company to integrate mobile devices into enterprise IT while still complying with these rules comprehensively. Depending on the company context, one or more of the technical architectures have to be chosen impacting the specific technical measures for compliance as elaborated in this paper. Altogether this paper, for the first time, correlates technical architectures for using mobile devices at the workplace with technical measures to assure data security and compliance according to a comprehensive set of rules.

Download full text files

Export metadata

Additional Services

Share in Twitter Search Google Scholar


Author:Carsten KleinerGND, Georg DistererORCiDGND
DOI original:https://doi.org/10.1016/j.procs.2015.08.490
Parent Title (English):Procedia Computer Science
Subtitle (English):Conference on ENTERprise Information Systems/International Conference on Project MANagement/Conference on Health and Social Care Information Systems and Technologies, CENTERIS/ProjMAN / HCist 2015 October 7-9, 2015
Document Type:Article
Year of Completion:2015
Publishing Institution:Hochschule Hannover
Release Date:2016/07/15
Tag:Compliance; Consumerization; Mobile Applications; Mobile Device; Security
First Page:274
Last Page:281
Link to catalogue:168545951X
Institutes:Fakult├Ąt IV - Wirtschaft und Informatik
DDC classes:004 Informatik
Licence (German):License LogoCreative Commons - CC BY-NC-ND - Namensnennung - Nicht kommerziell - Keine Bearbeitungen 4.0 International