The need to address mobile device security in the higher education IT curriculum

Karen P. Patten, Mark A. Harris

Research output: Contribution to journalArticlepeer-review

20 Scopus citations


Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading mobile operating systems (OS), Google's Android OS and Apple's iOS, both have security concerns as do the mobile applications and the major application markets. 'Bring your own devices,' where employees supply their own equipment for work-related purposes, can cut costs for organizations, but failing to address security can significantly increase those costs. This paper focuses on the increasing need for mobile business and its related mobile device security concerns. We propose that future IT professionals should be aware of these issues and learn how to secure mobile devices through the integration of the topic into the IT Model Curriculum. Using the case of one undergraduate IT program, we developed a set of mobile device security education recommendations, which we then mapped to the IT Model Curriculum using the guidelines from Accreditation Board for Engineering and Technology (ABET). This mapping approach demonstrates one way how higher education institutions could integrate mobile device security into any IT curriculum.

Original languageEnglish (US)
Pages (from-to)41-52
Number of pages12
JournalJournal of Information Systems Education
Issue number1
StatePublished - Jan 1 2013
Externally publishedYes


  • ABET
  • Curriculum design and development
  • Information assurance and security (IAS)
  • Mobile computing
  • Model curricula

ASJC Scopus subject areas

  • Education
  • Engineering (miscellaneous)


Dive into the research topics of 'The need to address mobile device security in the higher education IT curriculum'. Together they form a unique fingerprint.

Cite this