Return to Article Details Security considerations for smartphone devices Download Download PDF