The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security PDF Download

Are you looking for read ebook online? Search for your book and save it on your Kindle device, PC, phones or tablets. Download The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security PDF full book. Access full book title The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security by Janvan Munyoki. Download full books in PDF and EPUB format.

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security PDF Author: Janvan Munyoki
Publisher: GRIN Verlag
ISBN: 3346825205
Category : Computers
Languages : en
Pages : 142

Book Description
Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Commercial Information Technology, grade: 3.923, Capella University (School of Technology), course: PHD in Information Technology, language: English, abstract: Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum, with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers. This correlational study used the systems theory framework to examine the relationship between information security managers’ intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in Kenya who had obtained the Certified Information Systems Manager certification. Data was collected from 54 information security managers through a survey instrument. The survey instrument integrated three other instruments with proven reliability developed by other researchers. Data was analyzed using a multiple regression analysis to test for a relationship between the variables of the study (security, compliance, and intent to implement BYOD). The multiple regression conducted in this study was insignificant, indicating a relationship did not exist between the study’s variables (F(2, 86) = 0.33, p = .718, R2 = .00). A significant negative relationship was found between security and compliance, indicating a weakly negative correlation (r = -.26, p = .016). Using the results from the study, information technology leaders may be able to develop strategies from which to implement BYOD successfully. Implications for social change include increased knowledge of securing personal devices for employees and consumers in general and reduction in costs associated with security and data breaches.

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security

The Implementation Challenges to Bring Your Own Device Concept (BYOD) in Relation to Information Assurance and Security PDF Author: Janvan Munyoki
Publisher: GRIN Verlag
ISBN: 3346825205
Category : Computers
Languages : en
Pages : 142

Book Description
Doctoral Thesis / Dissertation from the year 2016 in the subject Computer Science - Commercial Information Technology, grade: 3.923, Capella University (School of Technology), course: PHD in Information Technology, language: English, abstract: Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum, with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers. This correlational study used the systems theory framework to examine the relationship between information security managers’ intentions, perceptions of security, and compliance regarding BYOD implementation. Participants of the study consisted of information security managers in Kenya who had obtained the Certified Information Systems Manager certification. Data was collected from 54 information security managers through a survey instrument. The survey instrument integrated three other instruments with proven reliability developed by other researchers. Data was analyzed using a multiple regression analysis to test for a relationship between the variables of the study (security, compliance, and intent to implement BYOD). The multiple regression conducted in this study was insignificant, indicating a relationship did not exist between the study’s variables (F(2, 86) = 0.33, p = .718, R2 = .00). A significant negative relationship was found between security and compliance, indicating a weakly negative correlation (r = -.26, p = .016). Using the results from the study, information technology leaders may be able to develop strategies from which to implement BYOD successfully. Implications for social change include increased knowledge of securing personal devices for employees and consumers in general and reduction in costs associated with security and data breaches.

Bring Your Own Device (BYOD) to Work

Bring Your Own Device (BYOD) to Work PDF Author: Bob Hayes
Publisher: Newnes
ISBN: 0124116108
Category : Computers
Languages : en
Pages : 21

Book Description
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Bring Your Own Device (BYOD) to Work is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Presents research data associated with BYOD and productivity in the workplace Describes BYOD challenges, risks, and liabilities Makes recommendations for the components a clearly communicated BYOD program should contain

Security Policy Opt-In Decisions in Bring-Your-Own-Device (Byod) - a Persuasion and Cognitive Elaboration Perspective

Security Policy Opt-In Decisions in Bring-Your-Own-Device (Byod) - a Persuasion and Cognitive Elaboration Perspective PDF Author: Xue Yang
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Book Description
Bring-Your-Own-Device (BYOD) has gained increased popularity in organizations but may engender information security concerns. To address these concerns, employees are expected to opt-in and comply with organizational BYOD security policy. This study investigates the factors that affect employees' opt-in decisions with BYOD security policy. Drawing on the theoretical lenses of persuasion and cognitive elaboration, we propose that employees' cognitive elaborations of BYOD security policy could be affected by the valence of justification of the BYOD security policy, the stringency of BYOD security measures, and the sequence of the introduction of BYOD security policy in relation to employees' use of personal devices to perform organizational tasks and such cognitive elaborations would in turn affect opt-in decisions. We conducted an experimental survey to test our propositions. The results indicate that positive BYOD security policy justification framing and post-task security policy exposure would lead to more positive cognitive elaboration, decision to opt-in, and compliance with the BYOD security policy. This research has significant implications for security management with respect to the design and implementation of BYOD security policy within an organization according to the nature of security policy and the task requirements. Full paper available at https://doi.org/10.1080/10919392.2019.1639913.

An Analysis of Bring Your Own Device on Corporate Security and Policy Recommendations for Information Services Support

An Analysis of Bring Your Own Device on Corporate Security and Policy Recommendations for Information Services Support PDF Author: Jason A. Bougetz
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 132

Book Description
Information Technology (IT) helps a business in the current state of mass information sharing and comprehension. Information Services (IS) departments allow a business to use new IT support services and knowledge in order to explore new ways of sharing data and doing business. Without IS constantly addressing new ways of doing business the environment for business operations can change dramatically, sometimes for the worse. Investigating, comprehending, sharing, supporting, and maintaining new IS policies and practices allows a business to stay competitive and secure in the every changing digital landscape. Bring Your Own Device (BYOD) practices have manifested as concepts and transformed into full blown new policies for companies both big and small. Without properly researching how to create a new BYOD policy, along with presenting the new policy to key stakeholders, the BYOD policy could experience company adoption resistance. In addition to policy research and stakeholders acceptance, BYOD policy enforcement is also needed in order for a policy to be successful. A successful policy can assist a company save money over the lifetime of the project. The agility that a new policy brings to a business helps transform the way the business conducts itself in the market place. Deciding what software a company should use and what security policies go into choosing a software package that will fit your business requires asking what a company needs a security suite to accomplish. Without setting proper standards on a global scale, the inconsistences pertaining to BYOD security could continue, making BYOD a challenge for a company to implement and understand. Keywords: Cybersecurity, Professor Daniel Draz, deficiency, cost, governance, digital, rules.

Overcoming Byod Implementation Challenges Toward a Management Framework. a Design Theory.

Overcoming Byod Implementation Challenges Toward a Management Framework. a Design Theory. PDF Author: Markus Heidenreich
Publisher: GRIN Verlag
ISBN: 9783656643081
Category :
Languages : de
Pages : 84

Book Description
Bachelor Thesis from the year 2013 in the subject Computer Science - Commercial Information Technology, grade: 1,0, University of Duisburg-Essen (SITM), language: English, abstract: "BYOD" is the abbreviation for "Bring Your Own Device." BYOD stands for the global trend in which employees of organizations are using their personally owned devices for the purpose of accomplishing work-related tasks. In practice, BYOD is a major concern for an organization's security and causes a number of challenges when it is introduced officially into organizations. There are also positive aspects of this trend like increased employee productivity. In literature, there are a number of recommendations concerning the introduction of BYOD - but unfortunately the focus is on particular aspects only. The aim of this thesis is to introduce an overall management framework for the introduction of BYOD which guides organizations to implement BYOD successfully and decrease the security issues at the same time. The research starts with a review of existing literature such as magazines, practitioner papers and study reports in order to identify management frameworks in regard to BYOD. As there is no overall management framework for the introduction of BYOD, the goal of this thesis is aiming at introducing one. The review resulted in a design theory in which meta-requirements are derived from the implementation challenges of BYOD which lead to the design principles and the overall management framework. The research process includes interviews with BYOD experts. The interviews consist each of an explorative and an evaluative part. Finally, this thesis contributes to the knowledge base of BYOD and gives practitioners a compendium for the introduction of BYOD.

Bring Your Own Devices (BYOD) Survival Guide

Bring Your Own Devices (BYOD) Survival Guide PDF Author: Jessica Keyes
Publisher: CRC Press
ISBN: 1466565047
Category : Business & Economics
Languages : en
Pages : 451

Book Description
Where end-users once queued up to ask the IT department for permission to buy a new computer or a new version of software, they are now bypassing IT altogether and buying it on their own. From laptops and smartphones to iPads and virtually unlimited software apps, end-users have tasted their freedom and love it. IT will simply never be the same.Bri

Mobile Access Safety

Mobile Access Safety PDF Author: Dominique Assing
Publisher: John Wiley & Sons
ISBN: 1118577981
Category : Technology & Engineering
Languages : en
Pages : 225

Book Description
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility. 2.Threats and Attacks. 3. Technological Countermeasures. 4. Technological Countermeasures for Remote Access. 5. What Should Have Been Done to Make Sure Mr Rowley’s Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise. Stephane Calé is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.

Remote Mobile Screen (RMS)

Remote Mobile Screen (RMS) PDF Author: Santiago Gimenez Ocano
Publisher:
ISBN:
Category :
Languages : en
Pages : 152

Book Description
Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices. BYOD increases job satisfaction and productivity in the employees, as they can choose which device to use and do not need to carry two or more devices. However, BYOD policies create an insecure environment, as the corporate network is extended and it becomes harder to protect it from attacks. In this scenario, the corporate information can be leaked, personal and corporate spaces are not separated, it becomes difficult to enforce security policies on the devices, and employees are worried about their privacy. Consequently, a secure BYOD environment must achieve the following goals: space isolation, corporate data protection, security policy enforcement, true space isolation, non-intrusiveness, and low resource consumption. We found that none of the currently available solutions achieve all of these goals. We developed Remote Mobile Screen (RMS), a framework that meets all the goals for a secure BYOD environment. To achieve this, the enterprise provides the employee with a Virtual Machine (VM) running a mobile operating system, which is located in the enterprise network and to which the employee connects using the mobile device. We provide an implementation of RMS using commonly available software for an x86 architecture. We address RMS challenges related to compatibility, scalability and latency. For the first challenge, we show that at least 90.2% of the productivity applications from Google Play can be installed on an x86 architecture, while at least 80.4% run normally. For the second challenge, we deployed our implementation on a high-performance server and run up to 596 VMs using 256 GB of RAM. Further, we show that the number of VMs is proportional to the available RAM. For the third challenge, we used our implementation on GENI and conclude that an application latency of 150 milliseconds can be achieved.

Recommendations and Privacy Requirements for a Bring-Your-Own-Device User Policy and Agreement

Recommendations and Privacy Requirements for a Bring-Your-Own-Device User Policy and Agreement PDF Author: Naval Postgraduate Naval Postgraduate School
Publisher: Createspace Independent Publishing Platform
ISBN: 9781522986287
Category :
Languages : en
Pages : 138

Book Description
The purpose of a bring-your-own-device (BYOD) program is to increase productivity as it allows individuals to access and manipulate data from non-traditional workplaces to support mission requirements. The United States Marine Corps (USMC) has started a pilot BYOD program, but a user policy for the USMC BYOD program has not yet been identified, despite the driving force that policy has on final implementation and potential acceptance. Therefore, this book answers the question, is it possible to develop a BYOD user policy for the USMC that minimizes risk for all parties while allowing for the intended flexibility? Three case studies were conducted on organizations that have implemented BYOD programs, comparing user policies and best practices to mitigate risks and address user privacy concerns. The case studies were also compared with governing Department of Defense instructions and National Institute of Standards and Technology guidance to identify a baseline of applicable security controls to formulate a viable user policy and agreement to support USMC security requirements. This book found that a clearly articulated user agreement tailored to the USMC's technological solution can be written to support the successful implementation of its BYOD program to ensure the benefits outweigh the potential risks.

Recommendations and Privacy Requirements for a Bring-Your-Own-Device User Policy and Agreement

Recommendations and Privacy Requirements for a Bring-Your-Own-Device User Policy and Agreement PDF Author: Naval Postgraduate Naval Postgraduate School
Publisher: CreateSpace
ISBN: 9781512184419
Category :
Languages : en
Pages : 138

Book Description
The purpose of a bring-your-own-device (BYOD) program is to increase productivity as it allows individuals to access and manipulate data from non-traditional workplaces to support mission requirements. The United States Marine Corps (USMC) has started a pilot BYOD program, but a user policy for the USMC BYOD program has not yet been identified, despite the driving force that policy has on final implementation and potential acceptance. Therefore, this thesis answers the question, is it possible to develop a BYOD user policy for the USMC that minimizes risk for all parties while allowing for the intended flexibility? Three case studies were conducted on organizations that have implemented BYOD programs, comparing user policies and best practices to mitigate risks and address user privacy concerns. The case studies were also compared with governing Department of Defense instructions and National Institute of Standards and Technology guidance to identify a baseline of applicable security controls to formulate a viable user policy and agreement to support USMC security requirements. This thesis found that a clearly articulated user agreement tailored to the USMC's technological solution can be written to support the successful implementation of its BYOD program to ensure the benefits outweigh the potential risks.