Information Systems in many companies rely heavily on the use of mobile devices by end users both to access the information as well as to post information to the Information System. Given this fact, analyzing the implications of setting up adequate controls in the Information Systems.