Abstract
The use of mobile devices is ubiquitous across all elements of daily life. The devices have become so embedded in all activities that users assume security concerns are limited to some specific apps or locations. Most devices and apps have credentialed logins that give an aura of privacy and security. When cautioned or asked whether to proceed to a somewhat suspect website, users proceed without exercising proper levels of caution. Convenience and time concerns out-weigh caution and privacy concerns for many users. This paper presents a teaching case, based on actual events, that provides students with a concrete example of how mobile devices can be used to commit business fraud. It demonstrates how seemingly-simple transactions that are conducted without careful security rules can cause great harm. The case includes teaching materials to support its use in the classroom.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alford, R., DiMattia, T., Hill, N., Stevens, K.: A series of revenue recognition research cases using the codification. Issues Account. Educ. 6(3), 609–650 (2011)
AICPA: Top Technology Initiatives. American Institute of Certified Public Accountants (2011). http://www.aicpa.org/InterestAreas/InformationTechnology/Resources/TopTechnologylnitiatives/Pages/2010TopTenInitiatives-Complete.aspx. Accessed 4 Jan 2012
Amato, N.: The top global risks for 2017. CGMA Magazine, 19 December 2016. www.cgma.org/Magazine
Baker, P.: Ten smartphone security tips. CIO Update, 9 February 2011. http://www.cioupdate.com/trends/article.php/3924241
Chen, B., Seilhamer, R., Bennett, L., Bauer, S.: Students’ mobile learning practices in higher education: a multi-year study. EduCause Review (2015). http://er.educause.edu/articles/2015/6/students-mobile-learning-practices-in-higher-education-a-multiyear-study
Cheng, G., Guan, Y., Chau, J.: An empirical study towards understanding user acceptance of bring your own device (BYOD) in higher education. Australas. J. Educ. Technol. 32(4), 1–17 (2016)
Erlanger, L.: Smartphone security best practices. McAfee Blog Central, 4 November 2010. http://blogs.mcafee.com/enterprise/security-connected
Healy, M., McCutcheon, M.: Engagement with active learning: reflections on the experience. Ir. Account. Rev. 15(1), 31–49 (2008)
Jones, B., Heinrichs, L.: Do business students practice smartphone security? J. Comput. Inf. Syst. 53(2), 22–30 (2012)
Jones, B., Chin, A., Aiken, P.: Risky business: students and smartphones. Techtrends: Link. Res. Pract. Improv. Learn. 58(6), 73–83 (2014)
Kim, E.: Recommendations for information security awareness training for college students. Inf. Manag. Comput. Secur. 22(1), 115–126 (2014)
Miller, W., Becker, D., Pernsteiner, A.: The accounting ethics course reconsidered. Glob. Perspect. Account. Educ. 11, 77–98 (2014)
O’Leary, C., Stewart, J.: The interaction of learning styles and teaching methodologies in accounting ethical instruction. J. Bus. Ethics 113(2), 225–241 (2013)
Patten, K., Harris, M.: The need to address mobile device security in the higher education curriculum. J. Inf. Syst. Educ. 24(1), 41–52 (2013)
Rose, B.: Security: How to keep your handset safe. PC World, 10 January 2010. http://www.pcworld.com/businesscenter/article/216420
Roux, B., Falgoust, M.: Information ethics in the context of smart devices. Ethics Inf. Technol. 15(3), 183–194 (2013)
Sánchez-Alzate, J., Sánchez-Torres, J.: Analysis of social factors and their relationship with perceived risk for e-commerce purchases. Dyna 84(200), 335–341 (2017)
Thomas, S.: Ethics and accounting education. Issues Account. Educ. 27(2), 399–450 (2012)
Xu, H., Rondeau, P., Mahenthiran, S.: Teaching case the challenge of implementing an ERP system in a small and medium enterprise - a teaching case of ERP project management. J. Inf. Syst. Educ. 22(4), 291–296 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 This is a U.S. government work and its text is not subject to copyright protection in the United States; however, its text may be subject to foreign copyright protection
About this paper
Cite this paper
Becker, D., Pernsteiner, A., Drum, D. (2018). The Impact of Mobile Device Use. In: Uden, L., Liberona, D., Ristvej, J. (eds) Learning Technology for Education Challenges. LTEC 2018. Communications in Computer and Information Science, vol 870. Springer, Cham. https://doi.org/10.1007/978-3-319-95522-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-95522-3_23
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-95521-6
Online ISBN: 978-3-319-95522-3
eBook Packages: Computer ScienceComputer Science (R0)