Skip to main content

The Impact of Mobile Device Use

  • Conference paper
  • First Online:
Learning Technology for Education Challenges (LTEC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 870))

Included in the following conference series:

  • 819 Accesses

Abstract

The use of mobile devices is ubiquitous across all elements of daily life. The devices have become so embedded in all activities that users assume security concerns are limited to some specific apps or locations. Most devices and apps have credentialed logins that give an aura of privacy and security. When cautioned or asked whether to proceed to a somewhat suspect website, users proceed without exercising proper levels of caution. Convenience and time concerns out-weigh caution and privacy concerns for many users. This paper presents a teaching case, based on actual events, that provides students with a concrete example of how mobile devices can be used to commit business fraud. It demonstrates how seemingly-simple transactions that are conducted without careful security rules can cause great harm. The case includes teaching materials to support its use in the classroom.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alford, R., DiMattia, T., Hill, N., Stevens, K.: A series of revenue recognition research cases using the codification. Issues Account. Educ. 6(3), 609–650 (2011)

    Article  Google Scholar 

  2. AICPA: Top Technology Initiatives. American Institute of Certified Public Accountants (2011). http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/TopTechnologylnitiatives/Pages/2010TopTenInitiatives-Complete.aspx. Accessed 4 Jan 2012

  3. Amato, N.: The top global risks for 2017. CGMA Magazine, 19 December 2016. www.cgma.org/Magazine

  4. Baker, P.: Ten smartphone security tips. CIO Update, 9 February 2011. http://www.cioupdate.com/trends/article.php/3924241

  5. Chen, B., Seilhamer, R., Bennett, L., Bauer, S.: Students’ mobile learning practices in higher education: a multi-year study. EduCause Review (2015). http://er.educause.edu/articles/2015/6/students-mobile-learning-practices-in-higher-education-a-multiyear-study

  6. Cheng, G., Guan, Y., Chau, J.: An empirical study towards understanding user acceptance of bring your own device (BYOD) in higher education. Australas. J. Educ. Technol. 32(4), 1–17 (2016)

    Google Scholar 

  7. Erlanger, L.: Smartphone security best practices. McAfee Blog Central, 4 November 2010. http://blogs.mcafee.com/enterprise/security-connected

  8. Healy, M., McCutcheon, M.: Engagement with active learning: reflections on the experience. Ir. Account. Rev. 15(1), 31–49 (2008)

    Google Scholar 

  9. Jones, B., Heinrichs, L.: Do business students practice smartphone security? J. Comput. Inf. Syst. 53(2), 22–30 (2012)

    Google Scholar 

  10. Jones, B., Chin, A., Aiken, P.: Risky business: students and smartphones. Techtrends: Link. Res. Pract. Improv. Learn. 58(6), 73–83 (2014)

    Article  Google Scholar 

  11. Kim, E.: Recommendations for information security awareness training for college students. Inf. Manag. Comput. Secur. 22(1), 115–126 (2014)

    Article  Google Scholar 

  12. Miller, W., Becker, D., Pernsteiner, A.: The accounting ethics course reconsidered. Glob. Perspect. Account. Educ. 11, 77–98 (2014)

    Google Scholar 

  13. O’Leary, C., Stewart, J.: The interaction of learning styles and teaching methodologies in accounting ethical instruction. J. Bus. Ethics 113(2), 225–241 (2013)

    Article  Google Scholar 

  14. Patten, K., Harris, M.: The need to address mobile device security in the higher education curriculum. J. Inf. Syst. Educ. 24(1), 41–52 (2013)

    Google Scholar 

  15. Rose, B.: Security: How to keep your handset safe. PC World, 10 January 2010. http://www.pcworld.com/businesscenter/article/216420

  16. Roux, B., Falgoust, M.: Information ethics in the context of smart devices. Ethics Inf. Technol. 15(3), 183–194 (2013)

    Article  Google Scholar 

  17. Sánchez-Alzate, J., Sánchez-Torres, J.: Analysis of social factors and their relationship with perceived risk for e-commerce purchases. Dyna 84(200), 335–341 (2017)

    Article  Google Scholar 

  18. Thomas, S.: Ethics and accounting education. Issues Account. Educ. 27(2), 399–450 (2012)

    Article  Google Scholar 

  19. Xu, H., Rondeau, P., Mahenthiran, S.: Teaching case the challenge of implementing an ERP system in a small and medium enterprise - a teaching case of ERP project management. J. Inf. Syst. Educ. 22(4), 291–296 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D’Arcy Becker .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 This is a U.S. government work and its text is not subject to copyright protection in the United States; however, its text may be subject to foreign copyright protection

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Becker, D., Pernsteiner, A., Drum, D. (2018). The Impact of Mobile Device Use. In: Uden, L., Liberona, D., Ristvej, J. (eds) Learning Technology for Education Challenges. LTEC 2018. Communications in Computer and Information Science, vol 870. Springer, Cham. https://doi.org/10.1007/978-3-319-95522-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95522-3_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95521-6

  • Online ISBN: 978-3-319-95522-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics