2017
DOI: 10.1155/2017/2057260
|View full text |Cite
|
Sign up to set email alerts
|

A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives

Abstract: Today, many organizations allow their employees to bring their own smartphones or tablets to work and to access the corporate network, which is known as a bring your own device (BYOD). However, many such companies overlook potential security risks concerning privacy and confidentiality. This paper provides a review of existing literature concerning the preservation of privacy and confidentiality, with a focus on recent trends in the use of BYOD. This review spans a large spectrum of information security resear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
17
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 42 publications
1
17
0
Order By: Relevance
“…Mobile devices contain a wealth of data that users might deem private. However, technological countermeasures for organizational security, such as monitoring and tracking, elicit privacy concerns among employees (Vorakulpipat et al , 2017). For example, e-mail filtering technology can monitor the content of private messages.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Mobile devices contain a wealth of data that users might deem private. However, technological countermeasures for organizational security, such as monitoring and tracking, elicit privacy concerns among employees (Vorakulpipat et al , 2017). For example, e-mail filtering technology can monitor the content of private messages.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Organizations may face internal and external threats such as computer viruses and employees' inappropriate use of information assets and data (Li et al , 2019; Xu and Guo, 2019). Employees' adoption of BYOD in the workplace may increase such challenges for enterprise information security management (Scarfò, 2012; Vorakulpipat et al , 2017). In a recent survey, 39% of companies cited security concerns as the primary barrier to BYOD adoption, including employees' unauthorized access to company data, the ability to download unsafe applications (apps) or content and stolen and lost devices (Deyan, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…If the user keeps passwords for e.g. social networks stored in the browser, the employer may be able to get access to this very private area (Vorakulpipat et al 2017). Also modern smartphone have GPS systems and the employer may be able to track the employees location and travel paths (Vorakulpipat et al 2017).…”
Section: Perceived Risk Of Participating In a Byod Programmentioning
confidence: 99%
“…social networks stored in the browser, the employer may be able to get access to this very private area (Vorakulpipat et al 2017). Also modern smartphone have GPS systems and the employer may be able to track the employees location and travel paths (Vorakulpipat et al 2017). Capturing these issues, privacy risk (PR-PR) is defined as the Bpotential loss of control over personal information^ (Featherman andPavlou 2003, p.1036).…”
Section: Perceived Risk Of Participating In a Byod Programmentioning
confidence: 99%
“…Notice that users obtain superuser access privileges to change the current Android version, to get access to the file system without restrictions, to install modified apps and gain more privileges, to improve performance, and so on. However, these access privileges may affect the security of installed applications [12,13,15], providing an access door to many sensitive information [16][17][18]. In this scenario, unintended data leakage flaws may exist.…”
Section: Introductionmentioning
confidence: 99%