<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
<front>
    <journal-meta>
        <journal-id journal-id-type="publisher-id">INFEDU</journal-id>
        <journal-title-group>
            <journal-title>Informatics in Education</journal-title>
        </journal-title-group>
        <issn pub-type="epub">1648-5831</issn>
        <issn pub-type="ppub">1648-5831</issn>
        <publisher>
            <publisher-name>VU</publisher-name>
        </publisher>
    </journal-meta>
    <article-meta>
                <article-id pub-id-type="publisher-id">INFEDU.2016.12</article-id>
                        <article-id pub-id-type="doi">10.15388/infedu.2016.12</article-id>
                        <article-categories>
            <subj-group subj-group-type="heading">
                <subject>Article</subject>
            </subj-group>
        </article-categories>
                        <title-group>
            <article-title>On Mobile Device Security Practices and Training Efficacy: An Empirical Study</article-title>
        </title-group>
                        <contrib-group>
                                        <contrib contrib-type="author">
                                                <name>
                    <surname>GOYAL CHIN</surname>
                    <given-names>Amita</given-names>
                </name>
                                <email xlink:href="mailto:agchin@vcu.edu">agchin@vcu.edu</email>
                                                <xref ref-type="aff" rid="j_INFEDU_aff_000"/>
                                            </contrib>
                        <aff id="j_INFEDU_aff_000">Department of Information Systems, School of Business, Virginia Commonwealth University
P.O. Box 844000, Richmond, Virginia 23284-4000</aff>
                                                    <contrib contrib-type="author">
                                                <name>
                    <surname>ETUDO</surname>
                    <given-names>Ugochukwu</given-names>
                </name>
                                <email xlink:href="mailto:etudouo@vcu.edu">etudouo@vcu.edu</email>
                                                <xref ref-type="aff" rid="j_INFEDU_aff_001"/>
                                            </contrib>
                        <aff id="j_INFEDU_aff_001">Department of Information Systems, School of Business, Virginia Commonwealth University
P.O. Box 844000, Richmond, Virginia 23284-4000</aff>
                                                    <contrib contrib-type="author">
                                                <name>
                    <surname>A. HARRIS</surname>
                    <given-names>Mark</given-names>
                </name>
                                <email xlink:href="mailto:marharris1@augusta.edu">marharris1@augusta.edu</email>
                                                <xref ref-type="aff" rid="j_INFEDU_aff_002"/>
                                            </contrib>
                        <aff id="j_INFEDU_aff_002">Augusta University Cyber Institute
1120 15th Street, University Hall/UH-127, Augusta, Georgia 30912</aff>
                                </contrib-group>
                                                                                                                                    <volume>15</volume>
                                <issue>2</issue>
                                    <fpage>235</fpage>
                        <lpage>252</lpage>
						<pub-date pub-type="epub">
                        <day>13</day>
                                    <month>10</month>
                        <year>2016</year>
        </pub-date>
                                                        <abstract>
                        <p>The past decade has witnessed an explosion of the penetration of mobile technology through all strata of society. Mobile technologies including cell phones, tablets, and even some e-readers are used for surfing the web, running apps, reading email, posting to social media, conducting banking transactions, etc. This liberation from desktop and laptop machines and from the requirements of a specific geographic location raises concerns regarding the problems and challenges of maintaining security while traversing cyberspace. The purpose of this empirical study is to investigate the attitudes, behaviors, and security practices of business students using mobile devices to access online resources. One group of students surveyed received no specific training regarding mobile security while a second group was surveyed following the completion of an online training program. Results show no significant difference in the security practices of the two groups, indicating that commercially available security training programs are largely inefficacious with respect to modifying student behavior and that additional research on training efficacy is needed.</p>
                    </abstract>
                <kwd-group>
            <label>Keywords</label>
                        <kwd>mobile device</kwd>
                        <kwd>mobile technology</kwd>
                        <kwd>training</kwd>
                        <kwd>higher education</kwd>
                    </kwd-group>
    </article-meta>
</front>
</article>
