Events for all Levels and InterestsStay
Jump Start Your Career GrowthStay
Get on the Higher Ed IT MapStay
Uncommon Thinking for the Common Good™Stay
Filter by type
Filter by Publications
Filter by Library Taxonomy
- Mobile Policy [x]
- Mobile Security [x]
- Security Management [x]
- Cybersecurity (13)
- Distributed Computing (13)
- Information Technology Management and Leadership (13)
- Mobile Computing (13)
- BYOD (5)
- Policy and Law (5)
- Privacy (5)
- Federal Policy and Law (4)
- Online Privacy (4)
- Smartphones (4)
- Mobile Support (3)
- Campus Policies (2)
- E-Learning (2)
- Institutional Management (2)
- Mobile Learning (2)
- Networking and Emerging Technologies (2)
- Teaching and Learning (2)
Information security takes on new dimensions in a mobile context. The protection of sensitive data, IT systems, and user privacy requires different strategies. Given the limited control colleges and universities have over the mobile devices and apps on campus, what solutions can institutions find to address issues of mobile security? Explore this resource site—a collection of all EDUCAUSE resources related to mobile security.
Articles, Papers, and Reports
- 7 Things You Should Know About Mobile Security, March 2011
An EDUCAUSE summary of the ways in which mobile computing amplifies some existing security concerns and introduces new ones, including issues surrounding user privacy.
Mobile Computing 5-Day Sprint—Day 4 Recap -- Security, Privacy, and Policy , June 2011
This brief summarizes day 4 of the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011.
Mobile Internet Device Security Guidelines, June 2011
A wiki designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. This site is maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Ten Steps to Secure Your Mobile Device, August 2010
A wiki featuring advice about securing mobile devices and a list of links to additional resources about mobile security, maintained by Internet2 and the Higher Education Information Security Council (HEISC).
Presentations and Seminars
Hot Topic Discussion: Mobility, Telecommuting, and the Cloud, April 2010
From the 2010 Security Professionals Conference, a presentation (including slides and a recording of the session) by Adam Goldstein and Joe St. Sauver that outlines the threats posed by mobile devices and measures that can limit the risk.
Location-Sharing Technologies: Privacy Risks and Controls, July 2010
An EDUCAUSE Live! web seminar with Lorrie Faith Cramor, who discusses the risks to user privacy posed by mobile devices, as well as strategies and tools that provide a level of control over how location-specific information is shared.
Mobile Computing: Safe or Sorry?, October 2010
A Point/Counterpoint presentation by Mark Bruhn and John Suess at the EDUCAUSE 2010 Annual Conference (including a video of the session and a shortened, audio version), in which the speakers debate strategies for securing mobile devices on campus.
Smartphone Privacy & Security: What Should We Teach Our Users?, April 2011Updated May 2012
In this session, an active researcher from Carnegie Mellon University will explore mobile privacy and security issues and suggest how campus policies can mitigate some of the larger risks.
Library Items on this Topic
EDUCAUSE Library Items for Mobile Security
- Privacy, Security, and Compliance: Strange Bedfellows, or a Marriage Made in Heaven?
January 28, 2013
Michael Corn is Chief Privacy and Security Officer at the University of Illinois, Urbana-Champaign. Jane Rosenthal is Director of the Privacy Office at the University of Kansas. Where doe…
- 7 Ways BYOD Could Get You Sued
July 18, 2012
The author, Sam Narisi, discusses some of the biggest legal issues to consider when coming up with a BYOD policy and strategy. The author, Sam Na…
- Podcast: Tom Zeller on Dramatic Changes in Higher Ed IT
July 11, 2012
Tom Zeller has over 30 years of higher education IT experience. His current role as Senior Technology Analyst in the Applied Technology Laboratory at Indiana University involves projects in e…
- Multiple Devices and Platforms: Institutional Strategies
May 17, 2012
This CNI’s Executive Roundtable on multiple devices and platforms discussed institutional strategies concerning BYOD. Faculty, staff, and students in our institutions continue to use laptops a…
- Field Research: Mobility in the Age of Consumerization
February 17, 2012
This 31-page report analyzes the results of a recent Gartner research study performed between August and October of 2011. The study focused on enterprise mobility and was designed to generate qu…
- Lions and Tigers and Mobile Devices: Removing the Fear Factor from Securing Smart Devices
May 17, 2012
A session at the Security Professionals Conference 2012
The dramatic increase of smart devices across campus has presented security professionals with some interesting opportunities and challenges. Two Texas state institutions will review where they are…
- Mobile Internet Device Security Guidelines
June 29, 2011
This document is designed to help you develop mobile Internet device security policy, standards, guidelines or procedures. It is organized into steps you can follow to define your objectives…
- Mobile Computing 5-Day Sprint—Summary
June 3, 2011
This EDUCAUSE brief summarizes the main themes from the EDUCAUSE Mobile Computing 5-Day Sprint, held April 25–29, 2011. This learning experience brought together presenters and hundreds of par…
- Mobile Privacy Issues Come to Capitol Hill—Apple’s iOS4 to be Examined in Senate Hearing
May 9, 2011
On Tues., May 10, 2011, the Senate Judiciary Subcommittee on Privacy, Technology, and the Law will meet on the theme of “Protecting Mobile Privacy: Your Smartphones, Tablets, Cell Phones and Yo…
- Security, Privacy and Policy: Special Expert Q&A Session
April 28, 2011
Listen to an informal Q&A session on today's theme of Security, Privacy and Policy. Listen to an informal Q&A session on today…