Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Library Taxonomy
- Mobile Security [x]
- Security Management [x]
- Cybersecurity (8)
- Distributed Computing (7)
- Information Technology Management and Leadership (7)
- Mobile Computing (7)
- Privacy (4)
- Mobile Application Development (3)
- Mobile Infrastructure (3)
- Online Privacy (3)
- Policy and Law (3)
- BYOD (2)
- Federal Policy and Law (2)
- Federal Privacy Law (2)
- Mobile Policy (2)
- Mobile Support (2)
- Identity Theft (1)
- Identity and Access Management (1)
- Planning (1)
- Support Services (1)
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy , June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011Updated May 2012
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- 8 Mobile Device Security Steps
October 1, 2013
A session at the EDUCAUSE LIVE! - 8 Mobile Device Security Steps
Every organization is challenged to rapidly deploy mobile device security. The SANS 8 Mobile Device Security Steps is a community-driven project to provide the most up-to-date information on the …
- Rolling Out a BYOD (Bring Your Own Device) Program
June 5, 2012
Use of personally owned devices continues to grow on campuses. If we don’t support these devices , community members will find their own way to support them, which could put our networks…
- Security, Privacy and Policy: Special Expert Q&A Session
April 28, 2011
Listen to an informal Q&A session on today's theme of Security, Privacy and Policy. Listen to an informal Q&A session on today…
- Smartphone Privacy & Security: What Should We Teach Our Users?
April 28, 2011
Mobile Computing: A 5 Day Sprint—Thursday, April 28 Information security takes on new dimensions in a mobile context. Protection of sensitive data, IT systems, and user privacy requi…
- Mobile Enterprise Integration: Special Expert Q&A Session
April 27, 2011
An informal Q&A session on today's theme: Mobile Enterprise Integration . An informal Q&A session on today's theme: Mobile…
- Mobile Enterprise Integration at Bucknell and the University of Mississippi
April 27, 2011
Mobile Computing: A 5 Day Sprint—Wednesday, April 27, 2011 The day is coming when users will be able to access the full range of enterprise-wide resources and conduct all enterprise …
- Several Ways to Understand Digital Privacy
April 21, 2011
Data privacy is frequently a confusing subject. This talk will explain why: Privacy comprises many different rights and protections that may apply in many different circumstances. It's fre…
- Location-Sharing Technologies: Privacy Risks and Controls
July 27, 2010
Due to the ability of cell phone providers to use cell phone towers to pinpoint users’ locations, the increasing popularity of GPS capabilities in cell phones, and the rise of cell phones for I…