Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?
What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?