2017
DOI: 10.1108/ics-03-2016-0025
|View full text |Cite
|
Sign up to set email alerts
|

A systematic approach to investigating how information security and privacy can be achieved in BYOD environments

Abstract: Purpose This paper’s purpose is to provide a current best practice approach that can be used to identify and manage bring your own device (BYOD) security and privacy risks faced by organisations that use mobile devices as part of their business strategy. While BYOD deployment can provide work flexibility, boost employees’ productivity and be cost cutting for organisations, there are also many information security and privacy issues, with some widely recognised, and others less understood. This paper focuses on… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(26 citation statements)
references
References 21 publications
0
26
0
Order By: Relevance
“…Bello et al [27] used a case study approach wherein data were collected using a survey questionnaire and interview instruments to determine BYOD usage patterns and perceptions, BYOD security and privacy, and support for BYOD, etc. Some of the limitations of this study include its small sample size and the potential misrepresentation of information by participants in interviews.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bello et al [27] used a case study approach wherein data were collected using a survey questionnaire and interview instruments to determine BYOD usage patterns and perceptions, BYOD security and privacy, and support for BYOD, etc. Some of the limitations of this study include its small sample size and the potential misrepresentation of information by participants in interviews.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bello et al [13] present a research done among employees of three companies that use BYOD, raising risks, threats and challenges in the implantation and maintenance of this culture. At the end, the research presents a summary of data collected through the interviews and some technical solutions to mitigate the risks that were raised.…”
Section: Related Workmentioning
confidence: 99%
“…Seen from the viewpoint of an employee, it can increase mobility, flexibility, and ability to adopt the technology of choice. Moreover, it can lead to greater job satisfaction and an increase in employee productivity in organizations" [20]. Modern MDM is the primary key to allow your employees to bring their device, since through the separation of company and private data, employers and employees can participate of the benefits of using the device of their choice (in the defined limitations, like using a particular OS, etc.)…”
Section: The Organizational Aspectmentioning
confidence: 99%
“…and minimizing the hazards. Furthermore, a lack of usage of an MDM solution is the main reason for structural problems with BOYD [20].…”
Section: The Organizational Aspectmentioning
confidence: 99%