International Journal of Information Technology & Computer Science ( IJITCS )
Smart phones have been pervasively and ubiquitously penetrating and integrating into an organization's Information and Communication Technology (ICT) environment at a speedy rate. However, sensitive data such as instant message conversations, emails, credit card numbers, passwords and corporate private data made its ways into these devices. Smart Phones thus have become attractive targets to hackers, crackers, scammers and others. This paper is a part of a comprehensive study of smart phones and IT security dilemma from the employees' and their organizations' perspective.