
While the number of players involved in the delivery of mobile applications and services is large, the ultimate responsibility for security protection rests with the organization that does not want its reputation to be damaged by "whomever" of the players in the mobile value chain -- be it the equipment manufacturer, the network provider, the application vendor, or the end user/employee of the organization.