EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IACIS
2010-01-01
|
Series: | Issues in Information Systems |
Online Access: | http://iacis.org/iis/2010/204-210_LV2010_1470.pdf |
id |
doaj-0f470035ee7d4b77abc8cf96a6739aa6 |
---|---|
record_format |
Article |
spelling |
doaj-0f470035ee7d4b77abc8cf96a6739aa62020-11-25T02:36:30ZengIACISIssues in Information Systems1529-73142010-01-01111204210910EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATIONBeth JonesLynn Heinrichs http://iacis.org/iis/2010/204-210_LV2010_1470.pdf |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Beth Jones Lynn Heinrichs |
spellingShingle |
Beth Jones Lynn Heinrichs EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION Issues in Information Systems |
author_facet |
Beth Jones Lynn Heinrichs |
author_sort |
Beth Jones |
title |
EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION |
title_short |
EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION |
title_full |
EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION |
title_fullStr |
EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION |
title_full_unstemmed |
EXPLORING MOBILE DEVICE SECURITY POLICIES IN HIGHER EDUCATION |
title_sort |
exploring mobile device security policies in higher education |
publisher |
IACIS |
series |
Issues in Information Systems |
issn |
1529-7314 |
publishDate |
2010-01-01 |
description |
|
url |
http://iacis.org/iis/2010/204-210_LV2010_1470.pdf |
work_keys_str_mv |
AT bethjones exploringmobiledevicesecuritypoliciesinhighereducation AT lynnheinrichs exploringmobiledevicesecuritypoliciesinhighereducation |
_version_ |
1724799814752796672 |